Journal: Information Systems Security

Volume 15, Issue 6

2 -- 6Ken Dunham. Year of the Rootkit
7 -- 11Edward H. Freeman. Service of Process by Email
12 -- 24Tyson Macaulay. Risk Conductors
25 -- 29Mohammad Talib, Francis Joseph Ogwu, A. Samer. A New Algorithm for Hiding Gray Images Using Blocks
30 -- 40Cezar Drugescu, Rafael Etges. Maximizing the Return on Investment on Information Security Programs: Program Governance and Metrics
41 -- 44Richard G. Vedder. Katrina s Gift: A Wake-Up Call for Improved Disaster Planning
45 -- 55Joseph A. Cazier, B. Dawn Medlin. Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times
56 -- 63Mark Ryan del Moral Talabis. Honeynet Learning: Discovering Information Security
64 -- 75Jim Vandermeer. Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees email usage is not putting your company at risk

Volume 15, Issue 5

2 -- 6Ken Dunham. MetaFisher: Next-Generation Bots and Phishing
7 -- 12Abe Kleinfeld. Measuring Security
13 -- 21Thomas R. Peltier. Social Engineering: Concepts and Solutions
22 -- 29Gerald V. Post, Albert Kagan. Information Security Tradeoffs: The User Perspective
30 -- 38Elizabeth A. Nichols, Andrew Sudbury. Implementing Security Metrics Initiatives
39 -- 47David M. Lynch. Securing Against Insider Attacks
48 -- 53Alan Murphy. Protecting Your Internal Resources with Intranet Application Firewalls

Volume 15, Issue 4

2 -- 6Edward H. Freeman. Gmail and Privacy Issues
7 -- 16John Kindervag. The Five Myths of Wireless Security
17 -- 38Kevin Curran, Elaine Smyth. Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks
39 -- 42Brian Hernacki. Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do
43 -- 50Stuart C. K. So, John J. Liu. Securing RFID Applications: Issues, Methods, and Controls
51 -- 58Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer Jr., Dorsey W. Morrow. The Top Information Security Issues Facing Organizations: What Can Government Do to Help?

Volume 15, Issue 3

2 -- 4James Tiller. Virtual Security: The New Security Tool?
5 -- 9Edward H. Freeman. Open Source Software and the SCO Litigation
10 -- 17J. Patrick Ravenel. Effective Operational Security Metrics
18 -- 23Paul Chen. E-Mail Archiving: Understanding the Reasons, Risks, and Rewards
24 -- 35Rebecca Herold. Building an Effective Privacy Program
36 -- 45Zeinab Karake Shalhoub. Content Analysis of Web Privacy Policies in the GCC Countries
46 -- 54Karim Toubba. Employing Encryption to Secure Consumer Data

Volume 15, Issue 2

2 -- 4James Tiller. Security Answers the Call
5 -- 8Ken Dunham. The Problem with P2P
9 -- 15Darrell Epps, Scott Tanner, Carl Silva. Can VoIP Secure Itself for the Next Technology Wave?: A Look at Assessing Vulnerability in a Converged Environment
16 -- 21Bogdan Materna. Proactive Security for VoIP Networks
22 -- 41Kevin Curran, John Honan. Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution
42 -- 48Xin Luo. A Holistic Approach for Managing Spyware
49 -- 54Ramanan Ramanathan. Thinking Beyond Security

Volume 15, Issue 1

2 -- 5Jim Tiller. The Lion and the Gazelle
6 -- 10Ken Dunham. Money Mules: An Investigative View
11 -- 15Edward H. Freeman. Wardriving: Unauthorized Access to Wi-Fi Networks
16 -- 20Art Gilliland. Understanding the IM Security Threat
21 -- 30Sumit Dhar. Securing and Hardening RedHat Linux
31 -- 34Tommy Ward. Security of Backup Data
35 -- 42Bond Masuda. Managing the Risks of Managed Security Services
43 -- 52Russ Neal. Social Psychological Variables That Contribute to Resistance to Security Assessment Findings