Journal: Information Systems Security

Volume 17, Issue 5&6

207 -- 227Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis. Investigating Information Security Awareness: Research and Practice Gaps
243 -- 246Robert S. Fleming. Corporate Expectations of the IT Department in an Age of Terrorism: Ensuring Battle Readiness
247 -- 252Ryan Sherstobitoff. Anatomy of a Data Breach
253 -- 266Stanley Trepetin. Privacy-Preserving String Comparisons in Record Linkage Systems: A Review
267 -- 277Michael Workman, Richard Ford, William H. Allen. A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks
278 -- 287Dima Alhadidi, Mourad Debbabi, Prabir Bhattacharya. New AspectJ Pointcuts for Integer Overflow and Underflow Detection

Volume 17, Issue 4

164 -- 169Daniil M. Utin, Mikhail A. Utin, Jane Utin. General Misconceptions about Information Security Lead to an Insecure World
170 -- 178Sean M. Price. Host-Based Security Challenges and Controls: A Survey of Contemporary Research
179 -- 187Jonathan Matusitz. Cyberterrorism: Postmodern State of Chaos
188 -- 200Russ Neal. Service-Oriented Security Architecture and its Implications for Security Department Organization Structures
201 -- 202John Clark. How Secure is Your Hospital s Front Door?
203 -- 205John R. Rossi. Integrity versus Accuracy

Volume 17, Issue 3

110 -- 113Stephen D. Guhl, Ravi Pendse. The Communications Assistance for Law Enforcement Act (CALEA)
114 -- 123Santi Phithakkitnukoon, Ram Dantu, Enkh-Amgalan Baatarjav. VoIP Security - Attacks and Solutions
124 -- 131Michael Workman. Fear Commerce: Inflationary Effects of Global Security Initiatives
132 -- 142Chris Bronk. Hacking the Nation-State: Security, Information Technology and Policies of Assurance
143 -- 150Marianne Hoebich. Are Your Computer Files Protected Under the Fourth Amendment?
151 -- 161Ioannis V. Koskosas. Goal Setting and Trust in a Security Management Context

Volume 17, Issue 2

56 -- 74Azzam Mourad, Marc-André Laverdière, Mourad Debbabi. A High-level Aspect-oriented-based Framework for Software Security Hardening
75 -- 79Sanjay Anand. Information Security Implications of Sarbanes-Oxley
80 -- 86Tommie W. Singleton, Aaron J. Singleton. The Potential for a Synergistic Relationship Between Information Security and a Financial Audit
87 -- 94Rafael Etges, Emma Sutcliffe. An Overview of Transnational Organized Cyber Crime
95 -- 107Andy Luse, Kevin P. Scheibe, Anthony M. Townsend. A Component-Based Framework for Visualization of Intrusion Detection Events

Volume 17, Issue 1

2 -- 12W. Steve Albrecht, Chad Albrecht, Conan C. Albrecht. Current Trends in Fraud and its Detection
13 -- 25Bob Kearney, Theodore Tryfonas. Security Patterns for Automated Continuous Auditing
26 -- 32Stephen Primost. Applying Security within a Service-Oriented Architecture
33 -- 44Michele Berlot, Janche Sang. Dealing with Process Overload Attacks in UNIX
45 -- 54James E. Weber, Dennis Guster, Paul Safonov, Mark B. Schmidt. Weak Password Security: An Empirical Study