Abstract is missing.
- Management of the Benefits on the Client s Involvement on Ergonomic AnalysisIsabel F. Loureiro, Celina P. Leão, Pedro Arezes. 1-8 [doi]
- A Security Audit Framework to Manage Information System SecurityTeresa Susana Mendes Pereira, Henrique Santos. 9-18 [doi]
- The Cloud s Core Virtual Infrastructure SecurityAnnette Tolnai, Sebastiaan H. von Solms. 19-27 [doi]
- Collaboration and Command Tools for Crises ManagementTapio Saarelainen, Jorma Jormakka. 28-38 [doi]
- Trust and Reputation Management for Critical Infrastructure ProtectionFilipe Caldeira, Edmundo Monteiro, Paulo Simões. 39-47 [doi]
- An Approach to Textual SteganographyMichael Morran, George R. S. Weir. 48-54 [doi]
- Cybercrime Victimisations/Criminalisation and PunishmentAmeer Al-Nemrat, Hamid Jahankhani, David S. Preston. 55-62 [doi]
- Baby-Crying AcceptanceTiago Martins, Sérgio Tenreiro de Magalhães. 63-70 [doi]
- Design of Discrete Variable Structure Controller Based on Variable Boundary LayerShiBin Su, Heng Wang, Hua Zhang, Wei Xiong. 71-78 [doi]
- Cognitive Biometrics: Challenges for the FutureKenneth Revett, Sérgio Tenreiro de Magalhães. 79-86 [doi]
- Multimodal Biometrics and Multilayered IDM for Secure AuthenticationAbdullah Rashed, Henrique Santos. 87-95 [doi]
- Secure Biometric Multi-Logon System Based on Current Authentication TechnologiesBobby L. Tait. 96-103 [doi]
- Analysis of Fingerprint Image to Verify a PersonHossein Jahankhani, Maktuba Mohid. 104-119 [doi]
- Methods of Organizational Information Security - (A Literature Review)José Martins, Henrique dos Santos. 120-130 [doi]
- OTM Machine Acceptance: In the Arab CultureAbdullah Rashed, Henrique Santos. 131-138 [doi]
- A Study on the Interrelations between the Security-Related Antecedents of Customers' Online TrustHamid Reza Peikari. 139-148 [doi]
- Does Nationality Matter in the B2C Environment? Results from a Two Nation StudyHamid Reza Peikari. 149-159 [doi]
- Deployment of ERP Systems at Automotive Industries, Security Inspection (Case Study: IRAN KHODRO Automotive Company)Hatamirad Ali, Hasan Mehrjerdi. 160-169 [doi]
- Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging RisksJyoti Navare, Orhan Gemikonakli. 170-177 [doi]
- The Effect of Non-technical Factors in B2C E-Commerce - (A Case Study in Iran)Ali Sanayei, Reza Shafe'ei. 178-192 [doi]
- Self-monitoring Composite Rods for Sustainable ConstructionCristiana Gonilho-Pereira, Emilija Zdraveva, Raul Fangueiro, S. Lanceros-Mendez, Said Jalali, Mário de Araújo. 193-201 [doi]
- Systems Assurance, Complexity and Emergence: The Need for a Systems Based ApproachAli Hessami, Nicos Karcanias. 202-215 [doi]
- A Review on Sustainability ModelsAmin Hosseinian Far, Elias Pimenidis, Hamid Jahankhani, D. C. Wijeyesekera. 216-222 [doi]
- The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; A Structural Equation ModelingHamid Reza Peikari. 223-231 [doi]
- "Fiscal Illusion Causes Fiscal Delusion - Please Be Careful!"Paulo Mourão. 232-237 [doi]
- A Coloured Petri Net Analysis of the Transaction Internet ProtocolChristos K. Georgiadis, Ioannis Kokkinidis, Elias Pimenidis. 238-249 [doi]
- Identification of the Required Security Practices during e-Government MaturityAli Shayan, Behnam Abdi, Malihe Qeisari. 250-262 [doi]
- Dynamic Device Configuration in Ubiquitous EnvironmentsAbdullahi Arabo, Qi Shi, Madjid Merabti. 263-273 [doi]
- Mitigation of Control Channel Jamming via Combinatorial Key DistributionAbolfazl Falahati, Mahdi Azarafrooz. 274-281 [doi]
- A Proxy Signature Scheme Based on Coding TheoryHoda Jannati, Abolfazl Falahati. 282-290 [doi]
- Partially Key Distribution with Public Key Cryptosystem Based on Error Control CodesSaeed Ebadi Tavallaei, Abolfazl Falahati. 291-299 [doi]