135 | -- | 146 | Sangkyun Kim. Linking information engineering and security engineering with a problem solving perspective |
147 | -- | 166 | Shuchih Ernest Chang, Shiou-Yu Chen, Chun-Yen Chen. Exploring the relationships between IT capabilities and information security management |
167 | -- | 203 | Kevin C. Desouza. Securing intellectual assets: integrating the knowledge and innovation dimensions |
204 | -- | 228 | Pedro Solana González, Daniel Perez González. Security model applied to electronic records management: experiences and results in the nuclear sector |
229 | -- | 251 | Hoai-Vu Nguyen, Sangmun Shin, Yongsun Choi. An integrated approach to the optimal selection of security tools using analytic hierarchy process and goal programming |
252 | -- | 269 | Fengyi Lin, Shuching Chou, Wei-Kang Wang. IS practitioners' views on core factors of effective IT governance for Taiwan SMEs |
270 | -- | 287 | Sangkyun Kim. Auditing methodology on legal compliance of enterprise information systems |
288 | -- | 303 | Sharman Lichtenstein. Ethical issues for internet use policy: balancing employer and employee perspectives |
304 | -- | 320 | Antonio Volpentesta, Salvatore Ammirato, Roberto Palmieri. Investigating effects of security incident awareness on information risk perception |
321 | -- | 343 | Quey-Jen Yeh, Arthur Jung-Ting Chang. Technology-push and need-pull roles in information system security diffusion |