researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
7
, Issue
5
217
--
222
Huong Ngo Higgins
.
Corporate system security: towards an integrated management approach
223
--
231
David Kreltszheim
.
Identifying the proceeds of electronic money fraud
232
--
238
Ernest Jordan
.
IT contingency planning: management roles
239
--
240
Carolyn Oddie
.
Copyright protection in the digital age
241
--
247
Mohsen Attaran
,
Ilja VanLaar
.
Privacy and security on the Internet: how to secure your personal information and company data
247
--
254
John E. Psarras
,
Athanassios P. Papakonstantinou
,
Kostas S. Metaxiotis
.
Towards the integrated monitoring and evaluation system IMES: a real power
254
--
260
Martin Hans Knahl
,
Holger D. Hofmann
,
Andrew D. Phippen
.
A distributed component framework for integrated network and systems management
Volume
7
, Issue
4
166
--
170
Stephen Wilson
.
New models for the management of public key infrastructure and root certification authorities
171
--
175
Gurpreet Dhillon
.
Managing and controlling computer misuse
176
--
178
Mohsen Attaran
.
Internet-based business opportunities: buyers beware of scams
178
--
185
Brian W. Smith
,
Andrew J. Morris
.
Avoiding securities class actions arising from Y2K issues
186
--
199
Mitsuru Kodama
.
Strategic business applications and new virtual knowledge-based businesses through community-based information networks
Volume
7
, Issue
3
112
--
120
Garry Dinnie
.
The Second Annual Global Information Security Survey
121
--
128
Diomidis Spinellis
,
Spyros Kokolakis
,
Stefanos Gritzalis
.
Security requirements, risks and recommendations for small enterprise and home-office environments
129
--
132
Valerie Mosley
,
Margaret A. Hurley
.
IT skill retention
133
--
139
Philip Catania
.
Year 2000 legal and regulatory environment
140
--
150
Mitsuru Kodama
.
Community management support through community-based information networks
Volume
7
, Issue
2
69
--
75
Steven Furnell
,
Paul Dowland
,
Peter W. Sanders
.
Dissecting the Hacker Manifesto
76
--
82
Rod Hart
,
Darren Morgan
,
Hai Tran
.
An introduction to automated intrusion detection approaches
83
--
87
Stephen Wilson
.
Digital signatures and the future of documentation
88
--
98
Eng Huat Ng
.
Step-by-step guideline for designing and documenting the navigation structure of multimedia hypertext systems
95
--
100
Carrie Liddy
,
Alice Sturgeon
.
The evolution of certificate model architecture
Volume
7
, Issue
1
5
--
22
Jon-Arild Johannessen
,
Johan Olaisen
,
Bjørn Olsen
.
Strategic use of information technology for increased innovation and performance
23
--
30
Brenda Whittaker
.
What went wrong? Unsuccessful information technology projects
30
--
40
Lam-for Kwok
,
Dennis Longley
.
Information security management and modelling
40
--
50
Schubert Foo
,
Peng-Chor Leong
,
Siu Cheung Hui
,
Shigong Liu
.
Security considerations in the delivery of Web-based applications: a case study
50
--
58
Rossouw von Solms
.
Information security management: why standards are important