Journal: Inf. Manag. Comput. Security

Volume 15, Issue 5

350 -- 361Ranjan B. Kini. Vendor availability: a key factor for outsourcing in Chilean ICT sector
362 -- 371Malcolm R. Pattinson, Grantley Anderson. How well are information risks being communicated to your computer end-users?
372 -- 381Marcus Nohlberg, Johannes Bäckström. User-centred security applied to the development of a management information system
382 -- 393Shirley Atkinson, Chris Johnson, Andy Phippen. Improving protection mechanisms by understanding online risk
394 -- 407Almut Herzog, Nahid Shahmehri. Usable set-up of runtime security policies
408 -- 419Finn Olav Sveen, Jose Maria Sarriegi, Eliot Rich, Jose J. Gonzalez. Toward viable information security reporting systems
420 -- 431Konstantin Beznosov, Olga Beznosova. On the imbalance of the security problem space and its expected consequences

Volume 15, Issue 4

260 -- 269Hanudin Amin. An analysis of mobile credit card usage intentions
270 -- 282Princely Ifinedo. An empirical study of ERP success evaluations by business and IT managers
283 -- 294Mohamed Saad Saleh, Abdullah Alrabiah, Saad Haj Bakry. A STOPE model for the investigation of compliance with ISO 17799-2005
295 -- 312Vasileios Vlachos, Diomidis Spinellis. A PRoactive malware identification system based on the computer hygiene principles
313 -- 328Thian Song Ong, Andrew Teoh Beng Jin, Tee Connie. Personalized biometric key using fingerprint biometrics

Volume 15, Issue 3

168 -- 183Mohamad Noorman Masrek, Nor Shahriza Abdul Karim, Ramlah Hussein. Investigating corporate intranet effectiveness: a conceptual framework
184 -- 200Chris Tseng, Patrick Ng. Precisiated information retrieval for RSS feeds
201 -- 213D. P. Goyal. Information systems planning practices in Indian public enterprises
214 -- 225Nathan L. Clarke, A. R. Mekala. The application of signature recognition to transparent handwriting verification for mobile devices
226 -- 240Sarandis Mitropoulos, Dimitrios Patsos, Christos Douligeris. Incident response requirements for distributed security information management systems
241 -- 256Oge Marques, Pierre Baillargeon. Design of a multimedia traffic classifier for Snort

Volume 15, Issue 2

84 -- 101Adil Fathelrahamn, Mathew Shafaghi. Analyzing bloggers data on software design patterns and applications integration; methodology and implementation
102 -- 115ThuyUyen H. Nguyen, Joseph S. Sherif, Michael Newby. Strategies for successful CRM implementation
116 -- 127Klaus-Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell. Analysis of security-relevant semantics of BPEL in cross-domain defined business processes
128 -- 148Ahmad A. Abu-Musa. Evaluating the security controls of CAIS in developing countries: an empirical investigation
149 -- 166Pauline Ratnasingam. A risk-control framework for e-marketplace participation: the findings of seven cases

Volume 15, Issue 1

5 -- 22Sean Lancaster, David C. Yen, Albert H. Huang, Shin-Yuan Hung. The selection of instant messaging or e-mail: College students perspective for computer communication
23 -- 32Olusegun Folorunso, O. R. Vincent, B. M. Dansu. Image edge detection: A knowledge management technique for visual scene analysis
33 -- 45E. John Sebes, Mark Stamp. Solvable problems in enterprise digital rights management
46 -- 63Ahmad A. Abu-Musa. Evaluating the security controls of CAIS in developing countries: An examination of current research
64 -- 77Subhas C. Misra, Vinod Kumar, Uma Kumar. A strategic modeling technique for information security risk assessment