Journal: Computers & Security

Volume 17, Issue 4

278 -- 279Bill Hancock. From the editor
280 -- 292Bill Hancock. Security views
293 -- 298August Bequai. Balancing legal concerns over crime and security in cyberspace
299 -- 302Stephen Hinde. Contingency planning for the millenium
303 -- 307Thomas Finne. A conceptual framework for information security management
308 -- 312Chris Pounder. Further developments in the field of encryption and digital signatures
313 -- 324Pauline Ratnasingham. EDI security: The influences of trust on EDI risks
337 -- 345Sebastiaan H. von Solms, J. H. S. Geldenhuys. Collecting security baggage on the internet
347 -- 357Les Labuschagne, Jan H. P. Eloff. The use of real-time risk analysis to enable dynamic activation of countermeasures