Journal: Inf. Manag. Comput. Security

Volume 11, Issue 5

209 -- 215Helen L. Armstrong, Patrick J. Forde. Internet anonymity practices in computer crime
216 -- 221Kostas S. Metaxiotis, Konstantinos Ergazakis, Emanuel Samouilidis, John E. Psarras. Decision support through knowledge management: the role of the artificial intelligence
222 -- 229Joseph S. Sherif, Rod Ayers. Intrusion detection: methods and systems. Part II
230 -- 237Z. T. Temtime, S. V. Chinyoka, J. P. W. Shunda. Toward strategic use of IT in SMEs: a developing country perspective
238 -- 242Matthew J. Warren, William Hutchinson. A security risk management approach for e-commerce
243 -- 248Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang. An integrated system theory of information security management
249 -- 257Cungang Yang, Chang N. Zhang. An XML-based administration method on role-based access control in the enterprise environment

Volume 11, Issue 4

161 -- 166Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds. Keystroke dynamics on a mobile handset: a feasibility study
167 -- 174Jimmy J. M. Ng, K. X. Li. Implications of ICT for knowledge management in globalization
175 -- 186Joseph S. Sherif, Rod Ayers, Tommy G. Dearmond. Intrusion detection: the art and the practice. Part I
187 -- 194Raju Ramaswamy. A novel approach to solve DSL network data rate problems
195 -- 199Simeon Xenitellis. Identifying security vulnerabilities through input flow tracing and analysis

Volume 11, Issue 3

106 -- 114Heather Fulford, Neil F. Doherty. The application of information security policies in large UK-based organizations: an exploratory investigation
115 -- 122Yun E. Zeng, Roger H. L. Chiang, David C. Yen. Enterprise integration with advanced information technologies: ERP and data warehousing
123 -- 129H. J. A. (Rens) de Wolf, Marcel E. M. Spruit. Stealth tracing: Subliminal Traceroute
130 -- 138Hassan Aljifri, Alexander P. Pons, Daniel Collins. Global e-commerce: a framework for understanding and overcoming the trust barrier
139 -- 145Alexandr Seleznyov, Seppo Puuronen. Using continuous user authentication to detect masqueraders
146 -- 152Konstantinos Nikolopoulos, Kostas S. Metaxiotis, Vassilis Assimakopoulos, Eleni Tavanidou. A first approach to e-forecasting: a survey of forecasting Web services

Volume 11, Issue 2

53 -- 59Kostas S. Metaxiotis, John E. Psarras, Emanuel Samouilidis. Integrating fuzzy logic into decision suppport systems: current research and future prospects
60 -- 66Vidya Moghe. Privacy management - a new era in the Australian business environment
67 -- 73Luisa Focacci, Robert J. Mockler, Marc E. Gartenfeld, Dorothy G. Dologite. How to choose an ASP: selection guidelines
74 -- 83Ashish Garg, Jeffrey Curtis, Hilary Halper. Quantifying the financial impact of IT security breaches
84 -- 91Victoria Skoularidou, Diomidis Spinellis. Security architectures for network clients
92 -- 100Alan D. Smith. Exploring potential strategic impacts of XML-related technologies

Volume 11, Issue 1

5 -- 10Joseph S. Sherif, David P. Gilliam. Deployment of anti-virus software: a case study
11 -- 18Alan D. Smith, William T. Rupp. Application service providers: an application of the transaction cost model
19 -- 27Mayur S. Desai, Thomas C. Richards, Kiran J. Desai. E-commerce policies and customer privacy
28 -- 32Fritz H. Grupe. Information systems professionals and conflict of interest
33 -- 38Nasser Abouzakhar, Gordon A. Manson. Networks security measures using neuro-fuzzy agents
39 -- 44Yun E. Zeng, H. Joseph Wen, David C. Yen. Customer relationship management (CRM) in business-to-business (B2B) e-commerce