Abstract is missing.
- Taxonomy of WRT54G(S) Hardware and Custom FirmwareMarwan Al-Zarouni. 1-10
- Seeking information superiority: strategies for business in the commercial application of information operationsMartin Dart. 11-19
- An investigation into the paradox of organisational flexibility versus security: A research project overviewRosanna Fanciulli. 20-26
- Identity Synthesis: Creating An Identity From ScratchLennon Hopkins. 27-32
- Information Security: a MisnomerWilliam Hutchinson. 33-37
- Smart Card Authentication for Mobile DevicesWayne A. Jansen, Serban I. Gavrila, Clément Séveillac. 38-46
- Security Governance: Its Impact on Security CultureK. Koh, Anthonie B. Ruighaver, Sean B. Maynard, A. Ahmad. 47-58
- Non-Repudiation in Pure Mobile Ad Hoc NetworkYi-Chi Lin, Jill Slay. 59-66
- Understanding Transition towards Information Security Culture ChangeLeanne Ngo, Wanlei Zhou, Matthew Warren. 67-73
- My Problem or Our Problem? - Exploring the use of information sharing as a component of a holistic approach to e-security in response to the growth of Malicious Targeted Attacks Aaron Olding, Paul Turner. 74-79
- Benchmarking E-business Security: A Model and FrameworkGraeme Pye, Matthew J. Warren. 80-87
- Architecture for Self-Estimation of Security Level in Ad Hoc Network NodesReijo Savola. 88-94
- Risk Management in CRM Security ManagementMahdi Seify. 95-102
- Detecting Rogue Access Points that endanger the Maginot Line of Wireless AuthenticationZhiqi Tao, Anthonie B. Ruighaver. 103-110
- Physician secure thyselfPatricia A. H. Williams. 111-116
- The underestimation of threats to patient data in clinical practicePatricia A. H. Williams. 117-122
- Potential Bluetooth Vulnerabilities in SmartphonesLih Wern Wong. 123-132
- Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisationsAndrew Woodward. 133-140