Journal: Computers & Security

Volume 16, Issue 4

266 -- 275Harold Joseph Highland. Random bits & bytes
277 -- 284Tom Mulhall. Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology
285 -- 290Tom Mulhall. Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem
291 -- 297Tom Mulhall. Where have all the hackers gone?: Part 3 - Motivation and deterrence
298 -- 303Tom Mulhall. Where have all the hackers gone?: Part 4 - Legislation
304 -- 306Tom Mulhall. Where have all the hackers gone?: Part 5 - Conclusions
307 -- 315Tom Mulhall. Where have all the hackers gone?: Part 6 - Appendices and bibliography
316 -- 320Charles Cresson Wood. A management view of internet electronic commerce security
321 -- 326Gerald L. Kovacich. The ISSO must understand the business and management environment
339 -- 344Chih-Hung Wang, Tzonelih Hwang. Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication