Abstract is missing.
- Web Asssurance: Information Security Management for e-commerceLes Labuschagne. 1-12
- A Model and Implementation Guidelines for Information Security Strategies in Web EnvironmentsC. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, Panagiotis Kanellis, Drakoulis Martakos. 13-34
- A Three-Dimensional Framework for Security Implementation in Mobile EnvironmentsBethuel Roberto Vinaja. 35-44
- Maintaining Integrity within Mobile Self Protecting ObjectsWesley Brandi, Martin S. Olivier. 45-56
- Building on Solid Foundations: An Information Security Case StudyEdo Roos Lindgreen, Jaap Acohen, Hans de Boer, Gerrit Uit de Bosch, Cees van Rinsum. 57-72
- Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR IIElton Saul, Andrew Hutchison. 73-86
- Security Vulnerabilities and System Intrusions - The Need for Automatic Response FrameworksSteven Furnell, Maria Papadaki, G. Magklaras, A. Alayed. 87-98
- A New Paradigm for Adding Security Into IS Development MethodsMikko T. Siponen, Richard Baskerville. 99-112
- Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching ModuleJohn Biggam, Alan Hogarth. 113-126
- Security DocumentationLam-for Kwok, Peggy P. K. Fung, Dennis Longley. 127-140
- Transaction Based Risk Analysis - Using Cognitive Fuzzy TechniquesElmé Smith, Jan H. P. Eloff. 141-156
- A Security Method for Healthcare OrganisationsMatthew J. Warren, William Hutchinson. 157-166
- Interpreting Computer-Related Crime at the Malaria Research Center: A Case StudyGurpreet Dhillon, Leiser Silva. 167-182
- Intrusion Detection Systems: Possibilities for the FutureKaren A. Forcht, Christopher Allen, Barbara Brodman, David Corning, Jacob Kouns. 183-198
- Implementing Information Security Management SystemsFredrik Björck. 199-214