Journal: Inf. Manag. Comput. Security

Volume 11, Issue 1

5 -- 10Joseph S. Sherif, David P. Gilliam. Deployment of anti-virus software: a case study
11 -- 18Alan D. Smith, William T. Rupp. Application service providers: an application of the transaction cost model
19 -- 27Mayur S. Desai, Thomas C. Richards, Kiran J. Desai. E-commerce policies and customer privacy
28 -- 32Fritz H. Grupe. Information systems professionals and conflict of interest
33 -- 38Nasser Abouzakhar, Gordon A. Manson. Networks security measures using neuro-fuzzy agents
39 -- 44Yun E. Zeng, H. Joseph Wen, David C. Yen. Customer relationship management (CRM) in business-to-business (B2B) e-commerce