researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Inf. Manag. Comput. Security
Home
Index
Info
Volume
Volume
9
, Issue
5
205
--
212
Pawan Kumar Janbandhu
,
Mohammed Yakoob Siyal
.
Novel biometric digital signatures for Internet-based applications
213
--
224
Christina Costa
.
Information technology outsourcing in Australia: a literature review
225
--
232
Mary A. Clark
,
David C. Chou
,
David C. Yen
.
Domain names management: a strategy for electronic commerce security
233
--
236
Ramesh Kolluru
,
Paul Meredith
.
Security and trust management in supply chains
237
--
242
Martin Botha
,
Rossouw von Solms
.
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept
243
--
249
Margaret A. Hurley
.
IT outsourcing - managing the key asset
Volume
9
, Issue
4
146
--
153
Dimitrios S. Stamoulis
,
Dimitris Gouscos
,
Panagiotis Georgiadis
,
Drakoulis Martakos
.
Revisiting public information management for effective e-government services
154
--
164
Kostas S. Metaxiotis
,
John E. Psarras
,
Konstantinos Karnezis
.
NUMASS: a Web-based nuclear monitoring system
165
--
174
Godwin J. Udo
.
Privacy and security concerns as major barriers for e-commerce: a survey study
175
--
182
H. Arafat Ali
.
A new model for monitoring intrusion based on Petri Nets
183
--
197
Theodore Tryfonas
,
Evangelos A. Kiountouzis
,
Angeliki Poulymenakou
.
Embedding security practices in contemporary information systems development approaches
Volume
9
, Issue
3
106
--
111
William Hutchinson
,
Matthew J. Warren
.
Attitudes of Australian information system managers against online attackers
112
--
122
Mang-tang Chan
,
Lam-for Kwok
.
Integrating security design into the software development process for e-commerce systems
123
--
125
.
Say goodbye to the CIO, welcome to the business prophet
126
--
133
Reinhardt A. Botha
,
Jan H. P. Eloff
.
A framework for access control in workflow systems
134
--
136
M. A. Badamas
.
Mobile computer systems - security considerations
Volume
9
, Issue
2
61
--
70
Eddie W. L. Cheng
,
Heng Li
.
Information priority-setting for better resource allocation using analytic hierarchy process (AHP)
71
--
79
Stefanos Gritzalis
,
Dimitris Gritzalis
.
A digital seal solution for deploying trust on commercial transactions
80
--
87
David C. Yen
,
David C. Chou
.
Intranets for organizational innovation
88
--
92
Gayle Webb White
,
Sheila J. Pearson
.
Controlling corporate e-mail, PC use and computer security
93
--
101
Steven Furnell
,
Pelagia Chiliarchaki
,
Paul Dowland
.
Security analysers: administrator assistants or hacker helpers?
Volume
9
, Issue
1
5
--
12
H. Joseph Wen
,
Houn-Gee Chen
,
Hsin-Ginn Hwang
.
E-commerce Web site design: strategies and models
13
--
20
Ching-Yun Lee
,
Yi-Shiung Yeh
,
Deng-Jyi Chen
.
Model calculations to estimate the probability of secret reconstruction in computer environments
21
--
31
Euripidis Loukis
,
Diomidis Spinellis
.
Information systems security in the Greek public sector
32
--
37
Mariana Gerber
,
Rossouw von Solms
,
Paul L. Overbeek
.
Formalizing information security requirements
38
--
43
Nong Ye
.
Robust intrusion tolerance in information systems
44
--
51
Kostas S. Metaxiotis
,
John E. Psarras
,
Dimitris Askounis
.
Building ontologies for production scheduling systems: towards a unified methodology