Journal: Inf. Manag. Comput. Security

Volume 7, Issue 5

217 -- 222Huong Ngo Higgins. Corporate system security: towards an integrated management approach
223 -- 231David Kreltszheim. Identifying the proceeds of electronic money fraud
232 -- 238Ernest Jordan. IT contingency planning: management roles
239 -- 240Carolyn Oddie. Copyright protection in the digital age
241 -- 247Mohsen Attaran, Ilja VanLaar. Privacy and security on the Internet: how to secure your personal information and company data
247 -- 254John E. Psarras, Athanassios P. Papakonstantinou, Kostas S. Metaxiotis. Towards the integrated monitoring and evaluation system IMES: a real power
254 -- 260Martin Hans Knahl, Holger D. Hofmann, Andrew D. Phippen. A distributed component framework for integrated network and systems management

Volume 7, Issue 4

166 -- 170Stephen Wilson. New models for the management of public key infrastructure and root certification authorities
171 -- 175Gurpreet Dhillon. Managing and controlling computer misuse
176 -- 178Mohsen Attaran. Internet-based business opportunities: buyers beware of scams
178 -- 185Brian W. Smith, Andrew J. Morris. Avoiding securities class actions arising from Y2K issues
186 -- 199Mitsuru Kodama. Strategic business applications and new virtual knowledge-based businesses through community-based information networks

Volume 7, Issue 3

112 -- 120Garry Dinnie. The Second Annual Global Information Security Survey
121 -- 128Diomidis Spinellis, Spyros Kokolakis, Stefanos Gritzalis. Security requirements, risks and recommendations for small enterprise and home-office environments
129 -- 132Valerie Mosley, Margaret A. Hurley. IT skill retention
133 -- 139Philip Catania. Year 2000 legal and regulatory environment
140 -- 150Mitsuru Kodama. Community management support through community-based information networks

Volume 7, Issue 2

69 -- 75Steven Furnell, Paul Dowland, Peter W. Sanders. Dissecting the Hacker Manifesto
76 -- 82Rod Hart, Darren Morgan, Hai Tran. An introduction to automated intrusion detection approaches
83 -- 87Stephen Wilson. Digital signatures and the future of documentation
88 -- 98Eng Huat Ng. Step-by-step guideline for designing and documenting the navigation structure of multimedia hypertext systems
95 -- 100Carrie Liddy, Alice Sturgeon. The evolution of certificate model architecture

Volume 7, Issue 1

5 -- 22Jon-Arild Johannessen, Johan Olaisen, Bjørn Olsen. Strategic use of information technology for increased innovation and performance
23 -- 30Brenda Whittaker. What went wrong? Unsuccessful information technology projects
30 -- 40Lam-for Kwok, Dennis Longley. Information security management and modelling
40 -- 50Schubert Foo, Peng-Chor Leong, Siu Cheung Hui, Shigong Liu. Security considerations in the delivery of Web-based applications: a case study
50 -- 58Rossouw von Solms. Information security management: why standards are important