Journal: Inf. Manag. Comput. Security

Volume 11, Issue 3

106 -- 114Heather Fulford, Neil F. Doherty. The application of information security policies in large UK-based organizations: an exploratory investigation
115 -- 122Yun E. Zeng, Roger H. L. Chiang, David C. Yen. Enterprise integration with advanced information technologies: ERP and data warehousing
123 -- 129H. J. A. (Rens) de Wolf, Marcel E. M. Spruit. Stealth tracing: Subliminal Traceroute
130 -- 138Hassan Aljifri, Alexander P. Pons, Daniel Collins. Global e-commerce: a framework for understanding and overcoming the trust barrier
139 -- 145Alexandr Seleznyov, Seppo Puuronen. Using continuous user authentication to detect masqueraders
146 -- 152Konstantinos Nikolopoulos, Kostas S. Metaxiotis, Vassilis Assimakopoulos, Eleni Tavanidou. A first approach to e-forecasting: a survey of forecasting Web services