researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
11
, Issue
6
2
--
5
Jeffrey L. Ott
.
A New Year, A New Beginning
6
--
9
Edward H. Freeman
.
Internet Service Providers and Search Warrants
10
--
14
Ralph Spencer Poore
.
Attractive Hazard: Entrapment or Forensic Tool?
15
--
20
Anton Chuvakin
.
Honeypot Essentials
21
--
28
Thomas R. Peltier
.
Preparing for ISO 17799
29
--
38
John O. Wylder
.
Improving Security from the Ground Up
39
--
44
Mark B. Desman
.
The Ten Commandments of Information Security Awareness Training
45
--
56
Fritz H. Grupe
,
William L. Kuechler Jr.
,
Scott Sweeney
.
Dealing with Data Privacy Protection: An Issue for the 21st Century
Volume
11
, Issue
5
2
--
3
Jeffrey L. Ott
.
The Semi-Truck of Justice
4
--
9
Ralph Spencer Poore
.
The Wonders and Woes of Wireless
10
--
14
Edward H. Freeman
.
ISP Liability for Third-Party Defamation
15
--
23
Gerald L. Kovacich
,
Andy Jones
,
Perry G. Luzwick
.
Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2
24
--
32
Ed Gabrys
.
The International Dimensions of Cyber-Crime, Part 2: A Look at the Council of Europe s Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime
33
--
40
Gerald Post
,
Albert Kagan
.
The Dilemma of Security Patches
41
--
48
Bruce A. Lobree
.
Impact of Legislation on Information Security Management
Volume
11
, Issue
4
2
--
3
Jeffrey L. Ott
.
Everything Has Changed, But It Is All the Same
4
--
8
Edward H. Freeman
.
The Digital Millennium Copyright Act
9
--
20
Andy Jones
,
Gerald L. Kovacich
,
Perry G. Luzwick
.
Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1
21
--
32
Ed Gabrys
.
The International Dimensions of Cyber-Crime, Part 1
33
--
49
Carol A. Siegel
,
Ty R. Sagalow
,
Paul Serritella
.
Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security
50
--
54
Steve Stanek
.
Auditing Cryptography: Assessing System Security
Volume
11
, Issue
3
2
--
3
Jeffrey L. Ott
.
We Are One, We Are Borg
4
--
13
Robert Rosenbaum
.
The Future of Wireless Communications
22
--
27
Gilbert Held
.
Overcoming Wireless LAN Security Vulnerabilities
29
--
33
Mandy Andress
.
Wireless LAN Security
34
--
50
Dennis Seymour Lee
.
Wireless Internet Security
Volume
11
, Issue
2
2
--
3
Jeffrey L. Ott
.
Be Prepared
4
--
8
Edward H. Freeman
.
Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act
9
--
14
Michael J. Corby
.
The Case for Privacy
15
--
24
Mark A. Rush
,
Lucas G. Paglia
.
Balancing Privacy, Public Safety, and Network Security Concerns after September 11
25
--
29
Leslie D. Ball
.
CIO on Center Stage: September 11 Changes Everything
30
--
37
Alan Berman
.
Lessons Learned: The Aftermath of September 11
38
--
46
K. Narayanaswamy
.
ISPs and Denial of Service Attacks
Volume
11
, Issue
1
2
--
4
Jeffrey L. Ott
.
The Dot. Gones and Beyond
5
--
9
Edward H. Freeman
.
Third-Party Liability: Who Pays for Computer Damages?
11
--
15
Thomas J. Bray
.
Security Actions During Reduction in Workforce Efforts: What To Do When Downsizing
23
--
35
William L. Kuechler Jr.
,
Fritz H. Grupe
.
Digital Signatures: A Business View
36
--
43
Kelly J. Kuchta
.
Forensic Fieldwork: Experience Is the Best Teacher
44
--
50
Steven Schlarman
.
The Case for a Security Information System
51
--
56
Bob Worner
.
Choosing the Right Security Infrastructure for E-Business Success