Journal: Inf. Manag. Comput. Security

Volume 7, Issue 4

166 -- 170Stephen Wilson. New models for the management of public key infrastructure and root certification authorities
171 -- 175Gurpreet Dhillon. Managing and controlling computer misuse
176 -- 178Mohsen Attaran. Internet-based business opportunities: buyers beware of scams
178 -- 185Brian W. Smith, Andrew J. Morris. Avoiding securities class actions arising from Y2K issues
186 -- 199Mitsuru Kodama. Strategic business applications and new virtual knowledge-based businesses through community-based information networks