Abstract is missing.
- Corporate Information Security Education: Is Outcomes Based Education the Solution?Johan Van Niekerk, Rossouw von Solms. 3-18
- Towards Corporate Information Security ObedienceKerry-Lynn Thomson, Rossouw von Solms. 19-32
- CIIP-RAM - A Security Risk Analysis Methodology for Critical Information Infrastructure ProtectionT. B. Busuttil, Matthew J. Warren. 33-50
- A Framework For Role-based Monitoring of Insider MisuseAung Htike Phyo, Steven Furnell, Francisco Portilla. 51-66
- Update/Patch Management Systems: A Protocol Taxonomy with Security ImplicationsAndrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski. 67-80
- Investigating a Smart TechnologyKevin O Sullivan, Karen Neville, Ciara Heavin. 81-98
- Laboratory Support for Information Security EducationNatalia Miloslavskaia, Alexander Tolstoi, Dmitriy Ushakov. 101-116
- An Holistic Approach to an International Doctoral Program in Information SecurityLouise Yngström. 117-132
- A New Paradigm for Information Security Education at Doctoral LevelNimal Jayaratna. 133-140
- Highly Qualified Information Security Personnel Training in RussiaV. Gorbatov, A. Maluk, Natalia Miloslavskaia, Alexander Tolstoi. 141-146
- Doctor of Philosophy: IT SecurityJill Slay. 147-152
- Doctoral Programme on Information and Communication Systems Security at the University of the AegeanSokratis K. Katsikas. 153-158
- An International Security PerspectiveGerald Quirchmayr. 159-164
- Do Military Forces Need Ph.D.s?Ronald Dodge. 165-172
- A Doctoral Program with Specialization in Information Security: A High Assurance Constructive Security ApproachCynthia E. Irvine, Timothy E. Levin. 173-180
- A Security Model for Anonymous Credential SystemsAndreas Pashalidis, Chris J. Mitchell. 183-198
- Private Information Storage with Logarithm-Space Secure HardwareAlexander Iliev, Sean W. Smith. 199-214
- Taxonomy of Mixes and Dummy TrafficClaudia Díaz, Bart Preneel. 215-230
- Identity Management for Self-PortrayalTobias Baier, Christian P. Kunze. 231-244
- Privacy Preserving Online Reputation SystemsMarco Voss. 245-260
- A Risk Driven Approach to Designing Privacy Enhanced SecureEls Van Herreweghen. 261-276
- Privacy Invasive Software in File-Sharing ToolsAndreas Jacobsson, Martin Boldt, Bengt Carlsson. 277-292
- Infusing Privacy Norms in DRM - Incentives and Perspectives from LawAlex Cameron. 293-309