Journal: Inf. Manag. Comput. Security

Volume 9, Issue 5

205 -- 212Pawan Kumar Janbandhu, Mohammed Yakoob Siyal. Novel biometric digital signatures for Internet-based applications
213 -- 224Christina Costa. Information technology outsourcing in Australia: a literature review
225 -- 232Mary A. Clark, David C. Chou, David C. Yen. Domain names management: a strategy for electronic commerce security
233 -- 236Ramesh Kolluru, Paul Meredith. Security and trust management in supply chains
237 -- 242Martin Botha, Rossouw von Solms. The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept
243 -- 249Margaret A. Hurley. IT outsourcing - managing the key asset

Volume 9, Issue 4

146 -- 153Dimitrios S. Stamoulis, Dimitris Gouscos, Panagiotis Georgiadis, Drakoulis Martakos. Revisiting public information management for effective e-government services
154 -- 164Kostas S. Metaxiotis, John E. Psarras, Konstantinos Karnezis. NUMASS: a Web-based nuclear monitoring system
165 -- 174Godwin J. Udo. Privacy and security concerns as major barriers for e-commerce: a survey study
175 -- 182H. Arafat Ali. A new model for monitoring intrusion based on Petri Nets
183 -- 197Theodore Tryfonas, Evangelos A. Kiountouzis, Angeliki Poulymenakou. Embedding security practices in contemporary information systems development approaches

Volume 9, Issue 3

106 -- 111William Hutchinson, Matthew J. Warren. Attitudes of Australian information system managers against online attackers
112 -- 122Mang-tang Chan, Lam-for Kwok. Integrating security design into the software development process for e-commerce systems
123 -- 125. Say goodbye to the CIO, welcome to the business prophet
126 -- 133Reinhardt A. Botha, Jan H. P. Eloff. A framework for access control in workflow systems
134 -- 136M. A. Badamas. Mobile computer systems - security considerations

Volume 9, Issue 2

61 -- 70Eddie W. L. Cheng, Heng Li. Information priority-setting for better resource allocation using analytic hierarchy process (AHP)
71 -- 79Stefanos Gritzalis, Dimitris Gritzalis. A digital seal solution for deploying trust on commercial transactions
80 -- 87David C. Yen, David C. Chou. Intranets for organizational innovation
88 -- 92Gayle Webb White, Sheila J. Pearson. Controlling corporate e-mail, PC use and computer security
93 -- 101Steven Furnell, Pelagia Chiliarchaki, Paul Dowland. Security analysers: administrator assistants or hacker helpers?

Volume 9, Issue 1

5 -- 12H. Joseph Wen, Houn-Gee Chen, Hsin-Ginn Hwang. E-commerce Web site design: strategies and models
13 -- 20Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen. Model calculations to estimate the probability of secret reconstruction in computer environments
21 -- 31Euripidis Loukis, Diomidis Spinellis. Information systems security in the Greek public sector
32 -- 37Mariana Gerber, Rossouw von Solms, Paul L. Overbeek. Formalizing information security requirements
38 -- 43Nong Ye. Robust intrusion tolerance in information systems
44 -- 51Kostas S. Metaxiotis, John E. Psarras, Dimitris Askounis. Building ontologies for production scheduling systems: towards a unified methodology