Journal: Inf. Manag. Comput. Security

Volume 10, Issue 5

203 -- 209Nasser Abouzakhar, Gordon A. Manson. An intelligent approach to prevent distributed systems attacks
210 -- 224Mikko T. Siponen. Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria
225 -- 236Chang N. Zhang, Cungang Yang. Information flow analysis on role-based access control model
237 -- 241Elizabeth Tran, MaryAnne Atkinson. Security of personal data across national borders
242 -- 254Tim France, Dave Yen, Jyun-Cheng Wang, Chia-Ming Chang. Integrating search engines with data mining for customer-oriented information search
255 -- 260Pauline Ratnasingam. The importance of technology trust in Web services security

Volume 10, Issue 4

149 -- 158Someswar Kesh, Sam Ramanujan, Sridhar P. Nerur. A framework for analyzing e-commerce security
159 -- 164Hao Feng, Chan Choong Wah. Private key generation from on-line handwritten signatures
165 -- 170Kostas S. Metaxiotis, John E. Psarras, Stefanos Papastefanatos. Knowledge and information management in e-learning environments; the user agent architecture
171 -- 177Gaurav Jain, Deepali Singh, Shekhar Verma. Service level agreements in IP networks
178 -- 183Alan D. Smith, William T. Rupp. Issues in cybersecurity; understanding the potential risks associated with hackers/crackers
184 -- 192John A. Rodgers, David C. Yen, David C. Chou. Developing e-business; a strategic approach
196 -- 0Steven Furnell. Cybercrime - vandalizing the information society (Review)

Volume 10, Issue 3

100 -- 108I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki. An experimental comparison of secret-based user authentication technologies
109 -- 118Alan D. Smith, Felix Offodile. Information management of automatic data capture: an overview of technical developments
119 -- 125Clive Vermeulen, Rossouw von Solms. The information security management toolbox - taking the pain out of security management
126 -- 134Stuart Maguire. Identifying risks during information system development: managing the process
135 -- 139Mayur S. Desai, Thomas C. Richards, Thomas von der Embse. System insecurity - firewalls

Volume 10, Issue 2

57 -- 63Jintae Lee, Younghwa Lee. A holistic model of computer abuse within organizations
64 -- 72Alan D. Smith, William T. Rupp. Application service providers (ASP): moving downstream to enhance competitive advantage
73 -- 76Huong Ngo Higgins. Auditing disclosure risks of on-line broker-dealers
77 -- 84S. E. Kruck, Danny Gottovi, Farideh Moghadami, Ralph Broom, Karen A. Forcht. Protecting personal privacy on the Internet
85 -- 91Someswar Kesh, Sridhar P. Nerur, Sam Ramanujan. Quality of service - technology and implementation

Volume 10, Issue 1

5 -- 11Martin Botha, Rossouw von Solms. The utilization of trend analysis in the effective monitoring of information security. Part 2: the model
12 -- 19Austin Jay Harris, David C. Yen. Biometric authentication: assuring access to information
28 -- 32Farrokh Mamaghani. Evaluation and selection of an antivirus and content filtering software
33 -- 40Billy B. L. Lim, H. Joseph Wen. The impact of next generation XML
41 -- 48Ranjan B. Kini. IT in manufacturing for performance: the challenge for Thai manufacturers