


default search action
Information Management & Computer Security, Volume 14
Volume 14, Number 1, 2006
- Dan Eigeles:

Intelligent authentication, authorization, and administration (I3A). 5-23 - Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford:

Information security: management's effect on culture and policy. 24-36 - J. Arthur Gowan, Richard G. Mathieu, Mark B. Hey:

Earned value management in a data warehouse project. 37-50 - Fotis Draganidis, Gregoris Mentzas

:
Competency based management: a review of systems and approaches. 51-64 - Kevin Curran

, Sheila McKinney:
Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures. 65-74 - Jin Cong:

A novel watermarking algorithm for resistant geometric attacks using feature points matching. 75-98
Volume 14, Number 2, 2006
- Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang

:
An empirical study of information security policy on information security elevation in Taiwan. 104-115 - Yanjun Zuo, Brajendra Panda:

Distributed database damage assessment paradigm. 116-139 - William C. Brown:

Vasa.">IT governance, architectural competency, and the Vasa. 140-154 - David Luthy, Karen A. Forcht:

Laws and regulations affecting information management and frameworks for assessing compliance. 155-166 - Sean Lancaster, David C. Yen

, Cheng-Yuan Ku:
E-supply chain management: an evaluation of current web initiatives. 167-184 - Panos Fitsilis

:
Practices and problems in managing electronic services using SLAs. 185-195
Volume 14, Number 3, 2006
- Aggeliki Tsohou, Maria Karyda

, Spyros Kokolakis, Evangelos A. Kiountouzis:
Formulating information systems risk management strategies through cultural theory. 198-217 - Kim-Kwang Raymond Choo

:
Issue report on business adoption of Microsoft Passport. 218-234 - Maria Papadaki

, Steven Furnell
:
Achieving automated intrusion response: a prototype implementation. 235-251 - William Brown, Mezbahur Rahman, Travis Hacker:

Home page usability and credibility: A comparison of the fastest growing companies to the Fortune 30 and the implications to IT governance. 252-269 - Zeinab Karake Shalhoub:

Trust, privacy, and security in electronic business: the case of the GCC countries. 270-283 - Richard Mou, Brian Kleiner:

Duty of care involving outsourced payroll. 284-293
Volume 14, Number 4, 2006
- Hafid Agourram, Bill Robson:

Defining information systems success in Canada. 300-311 - Reyes-G. Gonzalez

, Jose Gasco
, Juan Llopis
:
Information systems managers' view about outsourcing in Spain. 312-326 - Michael Pilgermann, Andrew Blyth, Stilianos Vidalis:

Inter-organisational intrusion detection using knowledge grid technology. 327-342 - Arthur Jung-Ting Chang

, Quey-Jen Yeh:
On security preparations against possible IS threats across industries. 343-360 - George Magklaras

, Steven Furnell
, Phillip J. Brooke:
Towards an insider threat prediction specification language. 361-381 - Geoff Skinner

, Song Han, Elizabeth Chang
:
An information privacy taxonomy for collaborative environments. 382-394
Volume 14, Number 5, 2006
- Maria Karyda

, Evangelia Mitrou, Gerald Quirchmayr:
A framework for outsourcing IS/IT security services. 402-415 - Hervé Debar

, Jouni Viinikka:
Security information management as an outsourced service. 417-435 - Dimitrios Lekkas, Costas Lambrinoudakis

:
Outsourcing digital signatures: a solution to key management burden. 436-449 - Nijaz Bajgoric:

Information technologies for business continuity: an implementation framework. 450-466 - Sajjad ur Rehman:

IT applications in Kuwaiti financial companies: an analysis. 467-484 - Mohsen Ziaee, Mohammad Fathian, Seyed Jafar Sadjadi

:
A modular approach to ERP system selection: A case study. 485-495 - Olusegun Folorunso, Shawn Oluwafemi Ogunseye, Sushil K. Sharma:

An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities. 496-505

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














