209 | -- | 215 | Helen L. Armstrong, Patrick J. Forde. Internet anonymity practices in computer crime |
216 | -- | 221 | Kostas S. Metaxiotis, Konstantinos Ergazakis, Emanuel Samouilidis, John E. Psarras. Decision support through knowledge management: the role of the artificial intelligence |
222 | -- | 229 | Joseph S. Sherif, Rod Ayers. Intrusion detection: methods and systems. Part II |
230 | -- | 237 | Z. T. Temtime, S. V. Chinyoka, J. P. W. Shunda. Toward strategic use of IT in SMEs: a developing country perspective |
238 | -- | 242 | Matthew J. Warren, William Hutchinson. A security risk management approach for e-commerce |
243 | -- | 248 | Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang. An integrated system theory of information security management |
249 | -- | 257 | Cungang Yang, Chang N. Zhang. An XML-based administration method on role-based access control in the enterprise environment |