Journal: Inf. Manag. Comput. Security

Volume 14, Issue 5

402 -- 415Maria Karyda, Evangelia Mitrou, Gerald Quirchmayr. A framework for outsourcing IS/IT security services
417 -- 435Hervé Debar, Jouni Viinikka. Security information management as an outsourced service
436 -- 449Dimitrios Lekkas, Costas Lambrinoudakis. Outsourcing digital signatures: a solution to key management burden
450 -- 466Nijaz Bajgoric. Information technologies for business continuity: an implementation framework
467 -- 484Sajjad ur Rehman. IT applications in Kuwaiti financial companies: an analysis
485 -- 495Mohsen Ziaee, Mohammad Fathian, S. J. Sadjadi. A modular approach to ERP system selection: A case study
496 -- 505Olusegun Folorunso, Shawn Oluwafemi Ogunseye, Sushil K. Sharma. An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities

Volume 14, Issue 4

300 -- 311Hafid Agourram, Bill Robson. Defining information systems success in Canada
312 -- 326Reyes-G. Gonzalez, Jose Gasco, Juan Llopis. Information systems managers view about outsourcing in Spain
327 -- 342Michael Pilgermann, Andrew Blyth, Stilianos Vidalis. Inter-organisational intrusion detection using knowledge grid technology
343 -- 360Arthur Jung-Ting Chang, Quey-Jen Yeh. On security preparations against possible IS threats across industries
361 -- 381G. Magklaras, Steven Furnell, Phillip J. Brooke. Towards an insider threat prediction specification language
382 -- 394Geoff Skinner, Song Han, Elizabeth Chang. An information privacy taxonomy for collaborative environments

Volume 14, Issue 3

198 -- 217Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos A. Kiountouzis. Formulating information systems risk management strategies through cultural theory
218 -- 234Kim-Kwang Raymond Choo. Issue report on business adoption of Microsoft Passport
235 -- 251Maria Papadaki, Steven Furnell. Achieving automated intrusion response: a prototype implementation
252 -- 269William Brown, Mezbahur Rahman, Travis Hacker. Home page usability and credibility: A comparison of the fastest growing companies to the Fortune 30 and the implications to IT governance
270 -- 283Zeinab Karake Shalhoub. Trust, privacy, and security in electronic business: the case of the GCC countries
284 -- 293Richard Mou, Brian Kleiner. Duty of care involving outsourced payroll

Volume 14, Issue 2

104 -- 115Kwo-Shing Hong, Yen-Ping Chi, Louis R. Chao, Jih-Hsing Tang. An empirical study of information security policy on information security elevation in Taiwan
116 -- 139Yanjun Zuo, Brajendra Panda. Distributed database damage assessment paradigm
140 -- 154William C. Brown. Vasa. >IT governance, architectural competency, and the Vasa
155 -- 166David Luthy, Karen A. Forcht. Laws and regulations affecting information management and frameworks for assessing compliance
167 -- 184Sean Lancaster, David C. Yen, Cheng-Yuan Ku. E-supply chain management: an evaluation of current web initiatives
185 -- 195Panos Fitsilis. Practices and problems in managing electronic services using SLAs

Volume 14, Issue 1

24 -- 36Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., F. Nelson Ford. Information security: management s effect on culture and policy
37 -- 50J. Arthur Gowan, Richard G. Mathieu, Mark B. Hey. Earned value management in a data warehouse project
51 -- 64Fotis Draganidis, Gregoris Mentzas. Competency based management: a review of systems and approaches
65 -- 74Kevin Curran, Sheila McKinney. Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures
75 -- 98Jin Cong. A novel watermarking algorithm for resistant geometric attacks using feature points matching