Journal: Inf. Manag. Comput. Security

Volume 12, Issue 2

146 -- 153Thomas von der Embse, Mayur S. Desai, Seema Desai. How well are corporate ethics codes and policies applied in the trenches? Key factors and conditions
154 -- 166C. Bryan Foltz. Cyberterrorism, computer crime, and reality
167 -- 177Sonja Petrovic-Lazarevic, Amrik S. Sohal. Nature of e-business ethical dilemmas
178 -- 190Steven Furnell, I. Papadopoulos, Paul Dowland. A long-term trial of alternative user authentication technologies
191 -- 201Sajjad ur Rehman, Laila Marouf. Human resources for information management operations in Kuwaiti corporate companies