


default search action
Information Management & Computer Security, Volume 13
Volume 13, Number 1, 2005
- Andrew Stewart

:
Information security technologies as a commodity input. 5-15 - Alan D. Smith:

Exploring radio frequency identification technology and its impact on business systems. 16-28 - Marijke Coetzee

, Jan H. P. Eloff:
An access control framework for web services. 29-38 - Fawad Ahmed, Mohammed Yakoob Siyal:

A novel approach for regenerating a private key using password, fingerprint and smart card. 39-54 - Kostas S. Metaxiotis, Ioannis Zafeiropoulos, Konstantina Nikolinakou, John E. Psarras:

Goal directed project management methodology for the support of ERP implementation and optimal adaptation procedure. 55-71 - Adesina S. Sodiya, H. O. D. Longe, Adio T. Akinwale:

Maintaining privacy in anomaly-based intrusion detection systems. 72-80
Volume 13, Number 2, 2005
- Richard A. Riley Jr., Virginia Franke Kleist:

The biometric technologies business case: a systematic approach. 89-105 - Hsi-Peng Lu, Chin-Lung Hsu, Hsiu-Ying Hsu:

An empirical study of the effect of perceived risk upon intention to use online applications. 106-120 - Stephen C. Shih, H. Joseph Wen:

E-enterprise security management life cycle. 121-134 - Dmitriy V. Chulkov

, Mayur S. Desai:
Information technology project failures: Applying the bandit problem to evaluate managerial decision making. 135-143 - Carl Marnewick

, Les Labuschagne
:
A conceptual model for enterprise resource planning (ERP). 144-155 - A. Al-Ayed, Steven Furnell

, D. Zhao, Paul Dowland
:
An automated framework for managing security vulnerabilities. 156-166 - Someswar Kesh, M. K. Raja:

Development of a qualitative reasoning model for financial forecasting. 167-179
Volume 13, Number 3, 2005
- J. Redman, Matthew J. Warren

, William Hutchinson:
System survivability: a critical security problem. 182-188 - Petros Belsis

, Spyros Kokolakis, Evangelos A. Kiountouzis:
Information systems security from a knowledge management perspective. 189-202 - Ingo Stengel, Klaus Peter Fischer, Udo Bleimann, Jeanne Stynes:

Mitigating the mobile agent malicious host problem by using communication patterns. 203-211 - Ioannis Zafeiropoulos, Kostas S. Metaxiotis, Dimitris Askounis:

Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system. 212-234 - Adesina S. Sodiya, H. O. D. Longe:

An improved two-tiered strategy to intrusion detection. 235-243 - Iat Long Alex Lai:

Knowledge management for Chinese medicines: a conceptual model. 244-255
Volume 13, Number 4, 2005
- Andrew Blyth, Paula Thomas:

An XML-based architecture for data integration in vulnerability assessments. 260-273 - Olusegun Folorunso, Adewale Akintayo Ogunde:

Data mining as a technique for knowledge management in business process redesign. 274-280 - Niranjan Pati, Mayur S. Desai:

Conceptualizing strategic issues in information technology outsourcing. 281-296 - Atul Gupta, Rex Hammond

:
Information systems security issues and decisions for small businesses: An empirical examination. 297-310 - William Brown, Frank Nasuti:

What ERP systems can tell us about Sarbanes-Oxley. 311-327 - Adil Alsaid, Chris J. Mitchell

:
Dynamic content attacks on digital signatures. 328-336
Volume 13, Number 5, 2005
- David C. Chou, Hima Bindu Tripuramallu, Amy Y. Chou:

BI and ERP integration. 340-349 - Jianying Zhou, Jose Antonio Onieva

, Javier López
:
Optimized multi-party certified email protocols. 350-366 - Oleksiy Mazhelis, Jouni Markkula, Jari Veijalainen:

An integrated identity verification system for mobile terminals. 367-378 - Stefanos Gritzalis

:
A good-practice guidance on the use of PKI services in the public sector of the European Union member states. 379-398 - Reyes-G. Gonzalez

, Jose Gasco
, Juan Llopis
:
Information systems outsourcing success factors: a review and some results. 399-418 - Dan Eigeles:

Intelligent authentication, authorization, and administration (I3A). 419-434

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














