Journal: Inf. Manag. Comput. Security

Volume 10, Issue 3

100 -- 108I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki. An experimental comparison of secret-based user authentication technologies
109 -- 118Alan D. Smith, Felix Offodile. Information management of automatic data capture: an overview of technical developments
119 -- 125Clive Vermeulen, Rossouw von Solms. The information security management toolbox - taking the pain out of security management
126 -- 134Stuart Maguire. Identifying risks during information system development: managing the process
135 -- 139Mayur S. Desai, Thomas C. Richards, Thomas von der Embse. System insecurity - firewalls