researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
6
, Issue
5
196
--
198
Susan Cramm
,
Thornton May
.
Accelerating executive development: hey coach ..
199
--
204
Douglas Brockway
,
Margaret A. Hurley
.
Achieving IT success
205
--
211
Victor Portougal
,
Lech J. Janczewski
.
Industrial information-weight security models
212
--
217
Les Labuschagne
,
Jan H. P. Eloff
.
Real-time risk analysis using Java concepts
218
--
220
Stephen Wilson
.
Some limitations of web of trust models
221
--
223
Rossouw von Solms
.
Information security management (2): guidelines to the management of information technology security (GMITS)
224
--
225
Rossouw von Solms
.
Information security management (3): the Code of Practice for Information Security Management (BS 7799)
Volume
6
, Issue
4
155
--
159
Fritz H. Grupe
,
James M. Hensley
,
Jeanne H. Yamamura
.
Watching systems in action: security at the periphery
160
--
161
Margaret A. Hurley
.
Features and functions overload
162
--
166
Pauline Ratnasingham
.
Trust in Web-based electronic commerce security
167
--
173
M. E. Thomson
,
Rossouw von Solms
.
Information security awareness: educating your users effectively
174
--
177
Rossouw von Solms
.
Information security management (1): why information security is so important
178
--
184
H. Joseph Wen
,
Jyh-Horng Michael Tarn
.
Internet security: a case study of firewall selection
Volume
6
, Issue
3
115
--
126
Ernest-Jan Mutsaers
,
Han T. M. van der Zee
,
Henrik Giertz
.
The evolution of information technology
127
--
128
Thornton May
.
Strategic ignorance: the new competitive high ground
128
--
132
Kent D. Larson
.
The role of service level agreements in IT service delivery
133
--
137
Bruce Schneier
.
Security pitfalls in cryptographic design
138
--
144
Donald R. Moscato
.
Database gateway processor risk analysis using fuzzy logic
Volume
6
, Issue
2
55
--
65
Han T. M. van der Zee
.
Rejuvenating the IT supply organization
66
--
71
H. Joseph Wen
.
Internet computer virus protection policy
72
--
77
Lynette Barnard
,
Rossouw von Solms
.
The evaluation and certification of information security against BS 7799
78
--
101
David Thompson
.
1997 computer crime and security survey
Volume
6
, Issue
1
3
--
14
R. K. R. P. Puthli
.
METANET: a five-year Internet strategy
15
--
20
H. Joseph Wen
.
From client/server to intranet
21
--
27
Carrie Liddy
,
Alice Sturgeon
.
Seamless secured transactions
33
--
39
Pauline Ratnasingham
.
Internet-based EDI trust and security