Journal: Information Systems Security

Volume 11, Issue 6

2 -- 5Jeffrey L. Ott. A New Year, A New Beginning
6 -- 9Edward H. Freeman. Internet Service Providers and Search Warrants
10 -- 14Ralph Spencer Poore. Attractive Hazard: Entrapment or Forensic Tool?
15 -- 20Anton Chuvakin. Honeypot Essentials
21 -- 28Thomas R. Peltier. Preparing for ISO 17799
29 -- 38John O. Wylder. Improving Security from the Ground Up
39 -- 44Mark B. Desman. The Ten Commandments of Information Security Awareness Training
45 -- 56Fritz H. Grupe, William L. Kuechler Jr., Scott Sweeney. Dealing with Data Privacy Protection: An Issue for the 21st Century

Volume 11, Issue 5

2 -- 3Jeffrey L. Ott. The Semi-Truck of Justice
4 -- 9Ralph Spencer Poore. The Wonders and Woes of Wireless
10 -- 14Edward H. Freeman. ISP Liability for Third-Party Defamation
15 -- 23Gerald L. Kovacich, Andy Jones, Perry G. Luzwick. Global Information Warfare: How Businesses, Governments, and Others Achieve Objectives and Attain Competitive Advantages: Chapter 1, Part 2
24 -- 32Ed Gabrys. The International Dimensions of Cyber-Crime, Part 2: A Look at the Council of Europe s Cyber-Crime Convention and the Need for an International Regime to Fight Cyber-Crime
33 -- 40Gerald Post, Albert Kagan. The Dilemma of Security Patches
41 -- 48Bruce A. Lobree. Impact of Legislation on Information Security Management

Volume 11, Issue 4

2 -- 3Jeffrey L. Ott. Everything Has Changed, But It Is All the Same
4 -- 8Edward H. Freeman. The Digital Millennium Copyright Act
9 -- 20Andy Jones, Gerald L. Kovacich, Perry G. Luzwick. Everything You Wanted to Know about Information Warfare but Were Afraid to Ask, Part 1
21 -- 32Ed Gabrys. The International Dimensions of Cyber-Crime, Part 1
33 -- 49Carol A. Siegel, Ty R. Sagalow, Paul Serritella. Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security
50 -- 54Steve Stanek. Auditing Cryptography: Assessing System Security

Volume 11, Issue 3

2 -- 3Jeffrey L. Ott. We Are One, We Are Borg
4 -- 13Robert Rosenbaum. The Future of Wireless Communications
22 -- 27Gilbert Held. Overcoming Wireless LAN Security Vulnerabilities
29 -- 33Mandy Andress. Wireless LAN Security
34 -- 50Dennis Seymour Lee. Wireless Internet Security

Volume 11, Issue 2

2 -- 3Jeffrey L. Ott. Be Prepared
4 -- 8Edward H. Freeman. Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act
9 -- 14Michael J. Corby. The Case for Privacy
15 -- 24Mark A. Rush, Lucas G. Paglia. Balancing Privacy, Public Safety, and Network Security Concerns after September 11
25 -- 29Leslie D. Ball. CIO on Center Stage: September 11 Changes Everything
30 -- 37Alan Berman. Lessons Learned: The Aftermath of September 11
38 -- 46K. Narayanaswamy. ISPs and Denial of Service Attacks

Volume 11, Issue 1

2 -- 4Jeffrey L. Ott. The Dot. Gones and Beyond
5 -- 9Edward H. Freeman. Third-Party Liability: Who Pays for Computer Damages?
11 -- 15Thomas J. Bray. Security Actions During Reduction in Workforce Efforts: What To Do When Downsizing
23 -- 35William L. Kuechler Jr., Fritz H. Grupe. Digital Signatures: A Business View
36 -- 43Kelly J. Kuchta. Forensic Fieldwork: Experience Is the Best Teacher
44 -- 50Steven Schlarman. The Case for a Security Information System
51 -- 56Bob Worner. Choosing the Right Security Infrastructure for E-Business Success