Journal: Information Systems Security

Volume 12, Issue 6

2 -- 6Edward H. Freeman. Software Repossession: Electronic Self-Help
7 -- 11Ken Dunham. EICAR Test File Security Considerations
12 -- 16Anton Chuvakin. Monitoring IDS
17 -- 23Carl Endorf. Outsourcing Security: The Need, the Risks, the Providers, and the Process
24 -- 32Avi Chesla. Information Security: A Defensive Battle
33 -- 38Paul A. Henry. Protocol and Application Awareness: A New Trend or an Established Tradition?
39 -- 45Julio César Hernández Castro, José María Sierra, Arturo Ribagorda. Beware of the Security Software
46 -- 57G. Stevenson Smith. Recognizing and Preparing Loss Estimates from Cyber-Attacks

Volume 12, Issue 5

2 -- 4Jim Tiller. The Business of Security
5 -- 18Felicia M. Nicastro. Security Patch Management
19 -- 28Harold Long. Effective Use of Consultants in Your Security Programs
29 -- 41George Sadlier. Storage Area Networks: An Information Security Perspective
42 -- 51Mark Thyer. Understanding and Dealing with Common Peer-to-Peer (P2P) Application Security
52 -- 67Russ Neal. A Project Methodology for Disaster Recovery Testing in a Server Based Environment

Volume 12, Issue 4

2 -- 5Rich O Hanley. A Little Neglect May Breed Mischief ...
6 -- 11Ralph Spencer Poore. Advances in Cryptography
12 -- 16Edward H. Freeman. Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State
17 -- 18Ben Rothke. Who Guards the Computer Security Guards?
19 -- 28Ken Dunham. The Trouble with Trojans
29 -- 35Steven Hofmeyr. A New Approach to Security: Learning from Immunology
36 -- 40Robert Garigue, Marc Stefaniu. Information Security Governance Reporting
41 -- 49Stephen C. Shih, H. Joseph Wen. Building E-Enterprise Security: A Business View
50 -- 56Peter Stephenson. A Structured Approach to Incident Postmortems

Volume 12, Issue 3

2 -- 3Jeffrey L. Ott. The War on Words
4 -- 8Edward H. Freeman. Biometrics, Evidence, and Personal Privacy
9 -- 16Bruce A. Lobree. IT Security: A Tactical War
17 -- 28Ken Dunham. Evaluating Anti-Virus Software: Which Is Best?
29 -- 38Peter Stephenson. Structured Investigation of Digital Incidents in Complex Computing Environments
39 -- 44Judy D. Holmes. Will Big Brother Cause Your Company to Be Sued?
45 -- 47John Gordineer. Blended Threats: A New Era in Anti-Virus Protection

Volume 12, Issue 2

2 -- 4Jeffrey L. Ott. An Application of Security
5 -- 9Edward H. Freeman. Privacy Notices under the Gramm - Leach - Bliley Act
11 -- 15Mark B. Desman. The KISS Principle
16 -- 20Ken Dunham. Four Reasons Why Klez Is Widespread
21 -- 36Sureerut Inmor, Vatcharaporn Esichaikul, Dentcho N. Batanov. A Security-Oriented Extension of the Object Model for the Development of an Information System
37 -- 43Landall J. Stoltenberg. Application Security: Have We Locked the Windows and Left the Door Open?
44 -- 49Matunda Nyanchama, Marc Stefaniu. Analyzing Enterprise Network Vulnerabilities
50 -- 59Todd Fitzgerald. The HIPAA Final Rule: What s Changed?

Volume 12, Issue 1

2 -- 4Jeffrey L. Ott. The Real Cost of Computer Crime
5 -- 9Edward H. Freeman. Prosecution of Computer Virus Authors
10 -- 16Ken Dunham. Anna Kournikova Revealed
17 -- 21Steven Hofmeyr. Why Today s Security Technologies Are So Inadequate: History, Implications, and New Approaches
22 -- 33Ashish Garg, Jeffrey Curtis, Hilary Halper. The Financial Impact of IT Security Breaches: What Do Investors Think?
34 -- 42Thomas R. Peltier. Establishing Business Controls for Electronic Mail Communications
43 -- 53Todd Fitzgerald. HIPAA Security Rule 101: The Time to Act Is Now
54 -- 56Elizabeth M. Ferrarini. History of Best Practices Eases CareGroup s HIPAA Planning: Interview with Dr. John Halamka