Journal: Computers & Security

Volume 8, Issue 5

366 -- 367Harold Joseph Highland. From the editor
369 -- 380Harold Joseph Highland. Random bits & bytes
381 -- 388Harry B. DeMaio. Viruses-a management issue
389 -- 394Belden Menkus. It s time to rethink data processing fire protection
395 -- 396G. J. Bologna. Twenty-two reasons why MIS subordinates don t measure up to their bosses expectations
399 -- 416Holger Bürk, Andreas Pfitzmann. Digital payment systems enabling security and unobservability
417 -- 425W. H. Boshoff, Sebastiaan H. von Solms. A path context model for addressing security in potentially non-secure environments
427 -- 432Simon Wiseman. Preventing viruses in computer systems
433 -- 442Karin P. Badenhorst, Jan H. P. Eloff. Framework of a methodology for the life cycle of computer security in an organization
445 -- 455Esther H. Highland. Abstracts of recent articles and literature