


default search action
Information Management & Computer Security, Volume 15
Volume 15, Number 1, 2007
- Sean Lancaster, David C. Yen

, Albert H. Huang, Shin-Yuan Hung:
The selection of instant messaging or e-mail: College students' perspective for computer communication. 5-22 - Olusegun Folorunso, Olufunke R. Vincent, B. M. Dansu:

Image edge detection: A knowledge management technique for visual scene analysis. 23-32 - E. John Sebes, Mark Stamp

:
Solvable problems in enterprise digital rights management. 33-45 - Ahmad A. Abu-Musa

:
Evaluating the security controls of CAIS in developing countries: An examination of current research. 46-63 - Subhas C. Misra, Vinod Kumar, Uma Kumar

:
A strategic modeling technique for information security risk assessment. 64-77
Volume 15, Number 2, 2007
- Adil Fathelrahamn, Mathew Shafaghi:

Analyzing bloggers data on software design patterns and applications integration; methodology and implementation. 84-101 - ThuyUyen H. Nguyen, Joseph S. Sherif, Michael Newby:

Strategies for successful CRM implementation. 102-115 - Klaus Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell

:
Analysis of security-relevant semantics of BPEL in cross-domain defined business processes. 116-127 - Ahmad A. Abu-Musa

:
Evaluating the security controls of CAIS in developing countries: an empirical investigation. 128-148 - Pauline Ratnasingam:

A risk-control framework for e-marketplace participation: the findings of seven cases. 149-166
Volume 15, Number 3, 2007
- Mohamad Noorman Masrek

, Nor Shahriza Abdul Karim
, Ramlah Hussein:
Investigating corporate intranet effectiveness: a conceptual framework. 168-183 - Chris Tseng, Patrick Ng:

Precisiated information retrieval for RSS feeds. 184-200 - D. P. Goyal:

Information systems planning practices in Indian public enterprises. 201-213 - Nathan L. Clarke

, A. R. Mekala:
The application of signature recognition to transparent handwriting verification for mobile devices. 214-225 - Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris:

Incident response requirements for distributed security information management systems. 226-240 - Oge Marques, Pierre Baillargeon

:
Design of a multimedia traffic classifier for Snort. 241-256
Volume 15, Number 4, 2007
- Hanudin Amin:

An analysis of mobile credit card usage intentions. 260-269 - Princely Ifinedo:

An empirical study of ERP success evaluations by business and IT managers. 270-282 - Mohamed Saad Saleh

, Abdullah Alrabiah, Saad Haj Bakry:
A STOPE model for the investigation of compliance with ISO 17799-2005. 283-294 - Vasileios Vlachos

, Diomidis Spinellis
:
A PRoactive malware identification system based on the computer hygiene principles. 295-312 - Thian Song Ong

, Andrew Teoh Beng Jin
, Tee Connie
:
Personalized biometric key using fingerprint biometrics. 313-328
Volume 15, Number 5, 2007
- Themistokles Lazarides:

Comply! Resistance is futile. 339-349 - Ranjan B. Kini:

Vendor availability: a key factor for outsourcing in Chilean ICT sector. 350-361 - Malcolm R. Pattinson, Grantley Anderson:

How well are information risks being communicated to your computer end-users? 362-371 - Marcus Nohlberg, Johannes Bäckström:

User-centred security applied to the development of a management information system. 372-381 - Shirley Atkinson

, Chris A. Johnson, Andrew D. Phippen
:
Improving protection mechanisms by understanding online risk. 382-393 - Almut Herzog, Nahid Shahmehri:

Usable set-up of runtime security policies. 394-407 - Finn Olav Sveen, Jose M. Sarriegi, Eliot H. Rich, Jose J. Gonzalez:

Toward viable information security reporting systems. 408-419 - Konstantin Beznosov, Olga Beznosova:

On the imbalance of the security problem space and its expected consequences. 420-431

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














