


default search action
Information Management & Computer Security, Volume 12
Volume 12, Number 1, 2004
- Dimitris Gritzalis:

Embedding privacy in IT applications development. 8-26 - Adesina S. Sodiya, H. O. D. Longe, Adio T. Akinwale:

A new two-tiered strategy to intrusion detection. 27-44 - Kostas Maris, Kostas S. Metaxiotis, G. Pantou, Konstantinos Nikolopoulos, Eleni Tavanidou, Vassilis Assimakopoulos:

D-TIFIS: a decision support system for options trading. 45-65 - S. Srinivasan:

Role of trust in e-business success. 66-72 - Jau-Yang Liu, Jyh-Horng Michael Tarn, H. Joseph Wen:

Adopting e-commerce Web site operation modes: The current state of large US firms. 73-90 - Vassilis Tsoumas, Theodore Tryfonas

:
From risk analysis to effective security management: towards an automated approach. 91-101 - William T. Rupp, Alan D. Smith:

Exploring the impacts of P2P networks on the entertainment industry. 102-116 - Moncef Belhadjali, Gary L. Whaley:

A data mining approach to neural network training. 117-124 - Vasilios Zorkadis, P. Donos:

On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. 125-137
Volume 12, Number 2, 2004
- Thomas von der Embse, Mayur S. Desai, Seema Desai:

How well are corporate ethics codes and policies applied in the trenches? Key factors and conditions. 146-153 - C. Bryan Foltz:

Cyberterrorism, computer crime, and reality. 154-166 - Sonja Petrovic-Lazarevic, Amrik S. Sohal

:
Nature of e-business ethical dilemmas. 167-177 - Steven Furnell

, I. Papadopoulos, Paul Dowland
:
A long-term trial of alternative user authentication technologies. 178-190 - Sajjad ur Rehman, Laila Marouf:

Human resources for information management operations in Kuwaiti corporate companies. 191-201
Volume 12, Number 3, 2004
- Billy B. L. Lim, Yan Sun, Joaquin Vila:

Incorporating WS-Security into a Web services-based portal. 206-217 - Kostas S. Metaxiotis:

RECOT: an expert system for the reduction of environmental cost in the textile industry. 218-227 - Muhammad A. Razi, J. Michael Tarn, Faisal A. Siddiqui:

Exploring the failure and success of DotComs. 228-244 - Bouchaib Bahli, Younes Benslimane:

An exploration of wireless computing risks: Development of a risk taxonomy. 245-254 - Stefanos Gritzalis

:
Enhancing Web privacy and anonymity in the digital era. 255-287 - Fritz H. Grupe, Simon Jooste:

Genetic algorithms: A business perspective. 288-297
Volume 12, Number 4, 2004
- Hooshang M. Beheshti:

The impact of IT on SMEs in the United States. 318-327 - Jacques Botha, Rossouw von Solms:

A cyclic approach to business continuity planning. 328-337 - David C. Chou, Xin Tan, David C. Yen

:
Web technology and supply chain management. 338-349 - Konstantinos Moulinos, John Iliadis, Vassilis Tsoumas:

Towards secure sealing of privacy policies. 350-361 - Stuart Maguire:

Reconciling the system requirements process in changing business environments. 362-372
Volume 12, Number 5, 2004
- Xing-fen Wang, Yi-jun Li:

Formal definition and implementation of business-oriented SoD access control policy. 379-388 - Ning Zhao, David C. Yen

, I-Chiu Chang:
Auditing in the e-commerce era. 389-400 - Mayur S. Desai, Kiran J. Desai, Lucy Ojode:

A global information technology model: business applications in developing economies (case studies). 401-410 - Sanjay Rawat

, Ved Prakash Gulati, Arun K. Pujari:
Frequency- and ordering-based similarity measure for host-based intrusion detection. 411-421

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














