Journal: Inf. Manag. Comput. Security

Volume 6, Issue 5

196 -- 198Susan Cramm, Thornton May. Accelerating executive development: hey coach ..
199 -- 204Douglas Brockway, Margaret A. Hurley. Achieving IT success
205 -- 211Victor Portougal, Lech J. Janczewski. Industrial information-weight security models
212 -- 217Les Labuschagne, Jan H. P. Eloff. Real-time risk analysis using Java concepts
218 -- 220Stephen Wilson. Some limitations of web of trust models
221 -- 223Rossouw von Solms. Information security management (2): guidelines to the management of information technology security (GMITS)
224 -- 225Rossouw von Solms. Information security management (3): the Code of Practice for Information Security Management (BS 7799)

Volume 6, Issue 4

155 -- 159Fritz H. Grupe, James M. Hensley, Jeanne H. Yamamura. Watching systems in action: security at the periphery
160 -- 161Margaret A. Hurley. Features and functions overload
162 -- 166Pauline Ratnasingham. Trust in Web-based electronic commerce security
167 -- 173M. E. Thomson, Rossouw von Solms. Information security awareness: educating your users effectively
174 -- 177Rossouw von Solms. Information security management (1): why information security is so important
178 -- 184H. Joseph Wen, Jyh-Horng Michael Tarn. Internet security: a case study of firewall selection

Volume 6, Issue 3

115 -- 126Ernest-Jan Mutsaers, Han T. M. van der Zee, Henrik Giertz. The evolution of information technology
127 -- 128Thornton May. Strategic ignorance: the new competitive high ground
128 -- 132Kent D. Larson. The role of service level agreements in IT service delivery
133 -- 137Bruce Schneier. Security pitfalls in cryptographic design
138 -- 144Donald R. Moscato. Database gateway processor risk analysis using fuzzy logic

Volume 6, Issue 2

55 -- 65Han T. M. van der Zee. Rejuvenating the IT supply organization
66 -- 71H. Joseph Wen. Internet computer virus protection policy
72 -- 77Lynette Barnard, Rossouw von Solms. The evaluation and certification of information security against BS 7799
78 -- 101David Thompson. 1997 computer crime and security survey

Volume 6, Issue 1

3 -- 14R. K. R. P. Puthli. METANET: a five-year Internet strategy
15 -- 20H. Joseph Wen. From client/server to intranet
21 -- 27Carrie Liddy, Alice Sturgeon. Seamless secured transactions
33 -- 39Pauline Ratnasingham. Internet-based EDI trust and security