Journal: Inf. Manag. Comput. Security

Volume 9, Issue 2

61 -- 70Eddie W. L. Cheng, Heng Li. Information priority-setting for better resource allocation using analytic hierarchy process (AHP)
71 -- 79Stefanos Gritzalis, Dimitris Gritzalis. A digital seal solution for deploying trust on commercial transactions
80 -- 87David C. Yen, David C. Chou. Intranets for organizational innovation
88 -- 92Gayle Webb White, Sheila J. Pearson. Controlling corporate e-mail, PC use and computer security
93 -- 101Steven Furnell, Pelagia Chiliarchaki, Paul Dowland. Security analysers: administrator assistants or hacker helpers?