Journal: Information Systems Security

Volume 13, Issue 6

2 -- 4Richard O Hanley. Spyware, Adware, Malware - It s All Sleazeware to Me
5 -- 9Edward H. Freeman. Data Protection and the Commerce Clause
10 -- 14Ken Dunham. The Power of Intelligence
15 -- 22Adarbad Master. Digital Identities Can Tame the Wild, Wild Web
23 -- 36Zouheir Trabelsi, Hamza Rahmani. An Anti-Sniffer Based on ARP Cache Poisoning Attack
37 -- 42Steven Drew. Reducing Enterprise Risk with Effective Threat Management
51 -- 59Amir M. Hormozi. Cookies and Privacy

Volume 13, Issue 5

2 -- 3Richard O Hanley. Maintaining Security and Privacy Requires Getting Back to Basics
4 -- 8Edward H. Freeman. Document Theft: Appropriate Responses
9 -- 20Laurence J. Wolf. Can You Handle the Headaches? Analyzing and Optimizing the Effectiveness of the Incident Management Process
29 -- 39Russell L. Jones, Abhinav Rastogi. Secure Coding: Building Security into the Software Development Life Cycle
40 -- 52Raju Mehta. Oracle Database Security

Volume 13, Issue 4

2 -- 5Ken Dunham. Mydoom Miseries
6 -- 10Edward H. Freeman. Corporate Liability for Illegal Downloading of Copyrighted Music
11 -- 21Peter Stephenson. Forensic Analysis of Risks in Enterprise Systems
26 -- 38Martin Nemzow. Creating and Implementing MS Office Security
39 -- 43J. Thomas, Adam J. Elbirt. Understanding Internet Protocol Security
44 -- 56Thomas R. Peltier. Risk Analysis and Risk Management

Volume 13, Issue 3

5 -- 13Ruth Breu, Klaus Burger, Michael Hafner, Gerhard Popp. Towards a Systematic Development of Secure Systems
14 -- 21Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker. Efficient Tree Search in Encrypted Data
22 -- 31Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. Web Services Security: Is the Problem Solved?
32 -- 40Anat Hovav, John D Arcy. The Impact of Virus Attack Announcements on the Market Value of Firms
41 -- 47Weiliang Zhao, Vijay Varadharajan, George Bryan. Fair Trading Protocol with Offline Anonymous Credit Card Payment
48 -- 55Víctor Méndez Muñoz, Julio César Hernández Castro, Jesús Carretero, Félix García. Filtering Spam at E-Mail Server Level with Improved CRM114

Volume 13, Issue 2

2 -- 7Ken Dunham. Phishing Isn t So Sophisticated: Scary!
8 -- 12Edward H. Freeman. Digital Signatures and Electronic Contracts
13 -- 18Anton Chuvakin. Security Event Analysis through Correlation
19 -- 30Douglas G. Conorich. Monitoring Intrusion Detection Systems: From Data to Knowledge
31 -- 37Alec Main. Application Security: Building in Security during the Development Stage
38 -- 45Louisa Saunier. The Twelve Principles of Trusted Solutions
46 -- 55Alyson E. Beacham, Denise Johnson McManus. Recovery of Financial Services Firms in the World Trade Center, Post 9/11/01

Volume 13, Issue 1

2 -- 7Ken Dunham. Why SoBig Is So Big
8 -- 11Edward H. Freeman. Source Code Escrow
12 -- 17Nick Akerman. Protecting Yourself While Protecting Your Computer Data: Two Laws Make It More Important than Ever
18 -- 33Sumit Ghosh. The Nature of Cyber-attacks in the Future: A Position Paper
34 -- 43Candelaria Hernández-Goya, Pino Caballero-Gil. A New Role of Graph Theory: The Design of Probably Secure Cryptoprotocols
44 -- 50Thomas R. Peltier. Developing an Enterprisewide Policy Structure
51 -- 54Laurence J. Wolf. Preventing Failure: The Value of Performing a Single Point of Failure Analysis for Critical Applications and Systems