Journal: Information Systems Security

Volume 8, Issue 4

1 -- 3Jeffrey L. Ott. The New Millennium
1 -- 6John R. Vacca. Encryption Keys: Randomness Is Key to Their Undoing
1 -- 23Frederick Gallegos. Software Piracy: Some Facts, Figures, and Issues
1 -- 6Peter Stephenson. Where Is the IDS?
1 -- 8Charanjit Singh, Mark N. Frolick. Ibuttons: Building the Infrastructure for More Secure E-commerce
1 -- 16Charlene A. Dykman, Cindy Cook, H. Van Tran. A Guide to NetWare 5 Security and Control

Volume 8, Issue 3

3 -- 4Jeffrey L. Ott. Professionalism
5 -- 9Peter Stephenson. Coming of Age
10 -- 15Edward H. Freeman. Search and Seizure of Computer Equipment
16 -- 20Ralph Spencer Poore. Anonymity, Privacy, and Trust
21 -- 26Steve Schlarman. Meet Your Cracker Intrusion Management Using Criminal Profiling
27 -- 77Ralph Spencer Poore. Release for Public Comment

Volume 8, Issue 2

3 -- 4Jeffrey L. Ott. Human Nature
5 -- 9Gilbert Held. Employing Proxy Services
10 -- 13Peter Stephenson. Hiring Hackers
14 -- 20Edward H. Freeman. Webwrap and the Law of Contracts
21 -- 25Ben Rothke. Government Mandated Key Escrow: A Bad Idea That Won t Go Away?
27 -- 36Harry Demaio. Getting Started with PKI
50 -- 57Frederick Gallegos, Mohammad Al-abdullah. Selected Security and Legal Issues in E-Commerce
58 -- 68Carol A. Siegel. Intrusion Detection: Making the Business Case
69 -- 78Caroline R. Hamilton. Risk Management and Security

Volume 8, Issue 1

3 -- 5Jeffrey Ott. Preparing for the New Millennium
6 -- 10Peter Stephenson. Information Warfare, or, Help! The Sky Is Falling!
11 -- 14Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts. Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas?
15 -- 17Ralph Spencer Poore. Ethics and the Information Security Profession
18 -- 26A. Perry Schwartz, Mitchell A. Zalewski. Assuring Data Security Integrity at Ford Motor Company
27 -- 32Philip Carden. Public Key Infrastructure for Messaging Security
39 -- 44Edward H. Freeman. Cookies and Freedom of Information: The Putnam Pit Case
45 -- 53Ed Blackwell. Building a Solid Foundation for Intranet Security
54 -- 63David Johnson. Secure Access to Mission-Critical Applications
64 -- 72Janice C. Sipior, Burke T. Ward, Sebastian M. Rainone. A Strategy for Ethical Management of E-mail Privacy
73 -- 80William Yarberry. Telephony Security