researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Issue
Volume
9
, Issue
2
61
--
70
Eddie W. L. Cheng
,
Heng Li
.
Information priority-setting for better resource allocation using analytic hierarchy process (AHP)
71
--
79
Stefanos Gritzalis
,
Dimitris Gritzalis
.
A digital seal solution for deploying trust on commercial transactions
80
--
87
David C. Yen
,
David C. Chou
.
Intranets for organizational innovation
88
--
92
Gayle Webb White
,
Sheila J. Pearson
.
Controlling corporate e-mail, PC use and computer security
93
--
101
Steven Furnell
,
Pelagia Chiliarchaki
,
Paul Dowland
.
Security analysers: administrator assistants or hacker helpers?