researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Information Systems Security
Home
Index
Info
Volume
Volume
17
, Issue
5&6
207
--
227
Aggeliki Tsohou
,
Spyros Kokolakis
,
Maria Karyda
,
Evangelos A. Kiountouzis
.
Investigating Information Security Awareness: Research and Practice Gaps
243
--
246
Robert S. Fleming
.
Corporate Expectations of the IT Department in an Age of Terrorism: Ensuring Battle Readiness
247
--
252
Ryan Sherstobitoff
.
Anatomy of a Data Breach
253
--
266
Stanley Trepetin
.
Privacy-Preserving String Comparisons in Record Linkage Systems: A Review
267
--
277
Michael Workman
,
Richard Ford
,
William H. Allen
.
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks
278
--
287
Dima Alhadidi
,
Mourad Debbabi
,
Prabir Bhattacharya
.
New AspectJ Pointcuts for Integer Overflow and Underflow Detection
Volume
17
, Issue
4
164
--
169
Daniil M. Utin
,
Mikhail A. Utin
,
Jane Utin
.
General Misconceptions about Information Security Lead to an Insecure World
170
--
178
Sean M. Price
.
Host-Based Security Challenges and Controls: A Survey of Contemporary Research
179
--
187
Jonathan Matusitz
.
Cyberterrorism: Postmodern State of Chaos
188
--
200
Russ Neal
.
Service-Oriented Security Architecture and its Implications for Security Department Organization Structures
201
--
202
John Clark
.
How Secure is Your Hospital s Front Door?
203
--
205
John R. Rossi
.
Integrity versus Accuracy
Volume
17
, Issue
3
110
--
113
Stephen D. Guhl
,
Ravi Pendse
.
The Communications Assistance for Law Enforcement Act (CALEA)
114
--
123
Santi Phithakkitnukoon
,
Ram Dantu
,
Enkh-Amgalan Baatarjav
.
VoIP Security - Attacks and Solutions
124
--
131
Michael Workman
.
Fear Commerce: Inflationary Effects of Global Security Initiatives
132
--
142
Chris Bronk
.
Hacking the Nation-State: Security, Information Technology and Policies of Assurance
143
--
150
Marianne Hoebich
.
Are Your Computer Files Protected Under the Fourth Amendment?
151
--
161
Ioannis V. Koskosas
.
Goal Setting and Trust in a Security Management Context
Volume
17
, Issue
2
56
--
74
Azzam Mourad
,
Marc-André Laverdière
,
Mourad Debbabi
.
A High-level Aspect-oriented-based Framework for Software Security Hardening
75
--
79
Sanjay Anand
.
Information Security Implications of Sarbanes-Oxley
80
--
86
Tommie W. Singleton
,
Aaron J. Singleton
.
The Potential for a Synergistic Relationship Between Information Security and a Financial Audit
87
--
94
Rafael Etges
,
Emma Sutcliffe
.
An Overview of Transnational Organized Cyber Crime
95
--
107
Andy Luse
,
Kevin P. Scheibe
,
Anthony M. Townsend
.
A Component-Based Framework for Visualization of Intrusion Detection Events
Volume
17
, Issue
1
2
--
12
W. Steve Albrecht
,
Chad Albrecht
,
Conan C. Albrecht
.
Current Trends in Fraud and its Detection
13
--
25
Bob Kearney
,
Theodore Tryfonas
.
Security Patterns for Automated Continuous Auditing
26
--
32
Stephen Primost
.
Applying Security within a Service-Oriented Architecture
33
--
44
Michele Berlot
,
Janche Sang
.
Dealing with Process Overload Attacks in UNIX
45
--
54
James E. Weber
,
Dennis Guster
,
Paul Safonov
,
Mark B. Schmidt
.
Weak Password Security: An Empirical Study