Journal: Inf. Manag. Comput. Security

Volume 14, Issue 2

104 -- 115Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang. An empirical study of information security policy on information security elevation in Taiwan
116 -- 139Yanjun Zuo, Brajendra Panda. Distributed database damage assessment paradigm
140 -- 154William C. Brown. Vasa. >IT governance, architectural competency, and the Vasa
155 -- 166David Luthy, Karen A. Forcht. Laws and regulations affecting information management and frameworks for assessing compliance
167 -- 184Sean Lancaster, David C. Yen, Cheng-Yuan Ku. E-supply chain management: an evaluation of current web initiatives
185 -- 195Panos Fitsilis. Practices and problems in managing electronic services using SLAs