researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
15
, Issue
6
2
--
6
Ken Dunham
.
Year of the Rootkit
7
--
11
Edward H. Freeman
.
Service of Process by Email
12
--
24
Tyson Macaulay
.
Risk Conductors
25
--
29
Mohammad Talib
,
Francis Joseph Ogwu
,
A. Samer
.
A New Algorithm for Hiding Gray Images Using Blocks
30
--
40
Cezar Drugescu
,
Rafael Etges
.
Maximizing the Return on Investment on Information Security Programs: Program Governance and Metrics
41
--
44
Richard G. Vedder
.
Katrina s Gift: A Wake-Up Call for Improved Disaster Planning
45
--
55
Joseph A. Cazier
,
B. Dawn Medlin
.
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times
56
--
63
Mark Ryan del Moral Talabis
.
Honeynet Learning: Discovering Information Security
64
--
75
Jim Vandermeer
.
Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees email usage is not putting your company at risk
Volume
15
, Issue
5
2
--
6
Ken Dunham
.
MetaFisher: Next-Generation Bots and Phishing
7
--
12
Abe Kleinfeld
.
Measuring Security
13
--
21
Thomas R. Peltier
.
Social Engineering: Concepts and Solutions
22
--
29
Gerald V. Post
,
Albert Kagan
.
Information Security Tradeoffs: The User Perspective
30
--
38
Elizabeth A. Nichols
,
Andrew Sudbury
.
Implementing Security Metrics Initiatives
39
--
47
David M. Lynch
.
Securing Against Insider Attacks
48
--
53
Alan Murphy
.
Protecting Your Internal Resources with Intranet Application Firewalls
Volume
15
, Issue
4
2
--
6
Edward H. Freeman
.
Gmail and Privacy Issues
7
--
16
John Kindervag
.
The Five Myths of Wireless Security
17
--
38
Kevin Curran
,
Elaine Smyth
.
Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks
39
--
42
Brian Hernacki
.
Improving Bluetooth Security: What IT Managers and Mobile Device Users Can Do
43
--
50
Stuart C. K. So
,
John J. Liu
.
Securing RFID Applications: Issues, Methods, and Controls
51
--
58
Kenneth J. Knapp
,
Thomas E. Marshall
,
R. Kelly Rainer Jr.
,
Dorsey W. Morrow
.
The Top Information Security Issues Facing Organizations: What Can Government Do to Help?
Volume
15
, Issue
3
2
--
4
James Tiller
.
Virtual Security: The New Security Tool?
5
--
9
Edward H. Freeman
.
Open Source Software and the SCO Litigation
10
--
17
J. Patrick Ravenel
.
Effective Operational Security Metrics
18
--
23
Paul Chen
.
E-Mail Archiving: Understanding the Reasons, Risks, and Rewards
24
--
35
Rebecca Herold
.
Building an Effective Privacy Program
36
--
45
Zeinab Karake Shalhoub
.
Content Analysis of Web Privacy Policies in the GCC Countries
46
--
54
Karim Toubba
.
Employing Encryption to Secure Consumer Data
Volume
15
, Issue
2
2
--
4
James Tiller
.
Security Answers the Call
5
--
8
Ken Dunham
.
The Problem with P2P
9
--
15
Darrell Epps
,
Scott Tanner
,
Carl Silva
.
Can VoIP Secure Itself for the Next Technology Wave?: A Look at Assessing Vulnerability in a Converged Environment
16
--
21
Bogdan Materna
.
Proactive Security for VoIP Networks
22
--
41
Kevin Curran
,
John Honan
.
Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution
42
--
48
Xin Luo
.
A Holistic Approach for Managing Spyware
49
--
54
Ramanan Ramanathan
.
Thinking Beyond Security
Volume
15
, Issue
1
2
--
5
Jim Tiller
.
The Lion and the Gazelle
6
--
10
Ken Dunham
.
Money Mules: An Investigative View
11
--
15
Edward H. Freeman
.
Wardriving: Unauthorized Access to Wi-Fi Networks
16
--
20
Art Gilliland
.
Understanding the IM Security Threat
21
--
30
Sumit Dhar
.
Securing and Hardening RedHat Linux
31
--
34
Tommy Ward
.
Security of Backup Data
35
--
42
Bond Masuda
.
Managing the Risks of Managed Security Services
43
--
52
Russ Neal
.
Social Psychological Variables That Contribute to Resistance to Security Assessment Findings