Journal: Computers & Security

Volume 24, Issue 6

425 -- 426E. Eugene Schultz. The human factor in security
427 -- 436E. Eugene Schultz. Security views
437 -- 439C. Pollard. Telecom fraud: The cost of doing nothing just went up
440 -- 442Steven A. Hofmeyr. Host intrusion prevention: Part of the operating system or on top of the operating system?
443 -- 447Basie von Solms. Information Security Governance - Compliance management vs operational management
448 -- 459Terry L. Wiant. Information security policy s impact on reporting security incidents
460 -- 471Hsien-Chu Wu, Chin-Chen Chang. A novel digital image watermarking scheme based on the vector quantization technique
472 -- 484Marianthi Theoharidou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis. The insider threat to information systems and the effectiveness of ISO17799
485 -- 491Wolfgang Fischer, Niels Lepperhoff. Can critical infrastructures rely on the Internet?
492 -- 499Philip Machanick. A distributed systems approach to secure Internet mail
500 -- 504Min-Shiang Hwang, Jung-Wen Lo, Chia-Hsin Liu. Improvement on the flexible tree-based key management framework