Journal: Inf. Manag. Comput. Security

Volume 10, Issue 1

5 -- 11Martin Botha, Rossouw von Solms. The utilization of trend analysis in the effective monitoring of information security. Part 2: the model
12 -- 19Austin Jay Harris, David C. Yen. Biometric authentication: assuring access to information
28 -- 32Farrokh Mamaghani. Evaluation and selection of an antivirus and content filtering software
33 -- 40Billy B. L. Lim, H. Joseph Wen. The impact of next generation XML
41 -- 48Ranjan B. Kini. IT in manufacturing for performance: the challenge for Thai manufacturers