106 | -- | 114 | Heather Fulford, Neil F. Doherty. The application of information security policies in large UK-based organizations: an exploratory investigation |
115 | -- | 122 | Yun E. Zeng, Roger H. L. Chiang, David C. Yen. Enterprise integration with advanced information technologies: ERP and data warehousing |
123 | -- | 129 | H. J. A. (Rens) de Wolf, Marcel E. M. Spruit. Stealth tracing: Subliminal Traceroute |
130 | -- | 138 | Hassan Aljifri, Alexander P. Pons, Daniel Collins. Global e-commerce: a framework for understanding and overcoming the trust barrier |
139 | -- | 145 | Alexandr Seleznyov, Seppo Puuronen. Using continuous user authentication to detect masqueraders |
146 | -- | 152 | Konstantinos Nikolopoulos, Kostas S. Metaxiotis, Vassilis Assimakopoulos, Eleni Tavanidou. A first approach to e-forecasting: a survey of forecasting Web services |