


default search action
Information Management & Computer Security, Volume 9
Volume 9, Number 1, 2001
- H. Joseph Wen, Houn-Gee Chen, Hsin-Ginn Hwang:

E-commerce Web site design: strategies and models. 5-12 - Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen:

Model calculations to estimate the probability of secret reconstruction in computer environments. 13-20 - Euripidis N. Loukis, Diomidis Spinellis:

Information systems security in the Greek public sector. 21-31 - Mariana Gerber, Rossouw von Solms, Paul L. Overbeek:

Formalizing information security requirements. 32-37 - Nong Ye:

Robust intrusion tolerance in information systems. 38-43 - Kostas S. Metaxiotis, John E. Psarras, Dimitris Askounis:

Building ontologies for production scheduling systems: towards a unified methodology. 44-51
Volume 9, Number 2, 2001
- Eddie W. L. Cheng, Heng Li:

Information priority-setting for better resource allocation using analytic hierarchy process (AHP). 61-70 - Stefanos Gritzalis

, Dimitris Gritzalis:
A digital seal solution for deploying trust on commercial transactions. 71-79 - David C. Yen

, David C. Chou:
Intranets for organizational innovation. 80-87 - Gayle Webb White, Sheila J. Pearson:

Controlling corporate e-mail, PC use and computer security. 88-92 - Steven Furnell

, Pelagia Chiliarchaki, Paul Dowland
:
Security analysers: administrator assistants or hacker helpers? 93-101
Volume 9, Number 3, 2001
- William Hutchinson, Matthew J. Warren

:
Attitudes of Australian information system managers against online attackers. 106-111 - Mangtang Chan, Lam-for Kwok:

Integrating security design into the software development process for e-commerce systems. 112-122 - Say goodbye to the CIO, welcome to the business prophet. 123-125

- Reinhardt A. Botha

, Jan H. P. Eloff:
A framework for access control in workflow systems. 126-133 - Muhammed A. Badamas:

Mobile computer systems - security considerations. 134-136
Volume 9, Number 4, 2001
- Dimitrios S. Stamoulis, Dimitris Gouscos, Panagiotis Georgiadis, Drakoulis Martakos:

Revisiting public information management for effective e-government services. 146-153 - Kostas S. Metaxiotis, John E. Psarras, Konstantinos Karnezis:

NUMASS: a Web-based nuclear monitoring system. 154-164 - Godwin J. Udo:

Privacy and security concerns as major barriers for e-commerce: a survey study. 165-174 - H. Arafat Ali:

A new model for monitoring intrusion based on Petri Nets. 175-182 - Theodore Tryfonas

, Evangelos A. Kiountouzis, Angeliki Poulymenakou:
Embedding security practices in contemporary information systems development approaches. 183-197
Volume 9, Number 5, 2001
- Pawan Kumar Janbandhu

, Mohammed Yakoob Siyal:
Novel biometric digital signatures for Internet-based applications. 205-212 - Christina Costa:

Information technology outsourcing in Australia: a literature review. 213-224 - Mary A. Clark, David C. Chou, David C. Yen

:
Domain names management: a strategy for electronic commerce security. 225-232 - Ramesh Kolluru, Paul Meredith:

Security and trust management in supply chains. 233-236 - Martin Botha, Rossouw von Solms:

The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. 237-242 - Margaret A. Hurley:

IT outsourcing - managing the key asset. 243-249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














