Journal: Inf. Manag. Comput. Security

Volume 12, Issue 5

379 -- 388Xing-fen Wang, Yi-jun Li. Formal definition and implementation of business-oriented SoD access control policy
389 -- 400Ning Zhao, David C. Yen, I-Chiu Chang. Auditing in the e-commerce era
401 -- 410Mayur S. Desai, Kiran J. Desai, Lucy Ojode. A global information technology model: business applications in developing economies (case studies)
411 -- 421Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari. Frequency- and ordering-based similarity measure for host-based intrusion detection

Volume 12, Issue 4

318 -- 327Hooshang M. Beheshti. The impact of IT on SMEs in the United States
328 -- 337Jacques Botha, Rossouw von Solms. A cyclic approach to business continuity planning
338 -- 349David C. Chou, Xin Tan, David C. Yen. Web technology and supply chain management
350 -- 361Konstantinos Moulinos, John Iliadis, Vassilis Tsoumas. Towards secure sealing of privacy policies
362 -- 372Stuart Maguire. Reconciling the system requirements process in changing business environments

Volume 12, Issue 3

206 -- 217Billy B. L. Lim, Yan Sun, Joaquin Vila. Incorporating WS-Security into a Web services-based portal
218 -- 227Kostas S. Metaxiotis. RECOT: an expert system for the reduction of environmental cost in the textile industry
228 -- 244Muhammad A. Razi, J. Michael Tarn, Faisal A. Siddiqui. Exploring the failure and success of DotComs
245 -- 254Bouchaib Bahli, Younes Benslimane. An exploration of wireless computing risks: Development of a risk taxonomy
255 -- 287Stefanos Gritzalis. Enhancing Web privacy and anonymity in the digital era
288 -- 297Fritz H. Grupe, Simon Jooste. Genetic algorithms: A business perspective

Volume 12, Issue 2

146 -- 153Thomas von der Embse, Mayur S. Desai, Seema Desai. How well are corporate ethics codes and policies applied in the trenches? Key factors and conditions
154 -- 166C. Bryan Foltz. Cyberterrorism, computer crime, and reality
167 -- 177Sonja Petrovic-Lazarevic, Amrik S. Sohal. Nature of e-business ethical dilemmas
178 -- 190Steven Furnell, I. Papadopoulos, Paul Dowland. A long-term trial of alternative user authentication technologies
191 -- 201Sajjad ur Rehman, Laila Marouf. Human resources for information management operations in Kuwaiti corporate companies

Volume 12, Issue 1

8 -- 26Dimitris Gritzalis. Embedding privacy in IT applications development
27 -- 44A. S. Sodiya, H. O. D. Longe, A. T. Akinwale. A new two-tiered strategy to intrusion detection
45 -- 65Kostas Maris, Kostas S. Metaxiotis, G. Pantou, Konstantinos Nikolopoulos, Eleni Tavanidou, Vassilis Assimakopoulos. D-TIFIS: a decision support system for options trading
66 -- 72S. Srinivasan. Role of trust in e-business success
73 -- 90Jau-Yang Liu, Jyh-Horng Michael Tarn, H. Joseph Wen. Adopting e-commerce Web site operation modes: The current state of large US firms
91 -- 101Vassilis Tsoumas, Theodore Tryfonas. From risk analysis to effective security management: towards an automated approach
102 -- 116William T. Rupp, Alan D. Smith. Exploring the impacts of P2P networks on the entertainment industry
117 -- 124Moncef Belhadjali, Gary L. Whaley. A data mining approach to neural network training
125 -- 137Vasilios Zorkadis, P. Donos. On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements