Abstract is missing.
- International Information Technology (IT) Security Cooperation into the 21st CenturyWayne Madsen. 5-12
- Computer Disasters: The Impact on Business in the 1990 sAlan Reed. 13-21
- ASEAN - Computer Crime and Corrective Action: A Status ReportTeck Soon Chew. 23-33
- Information Security: The Impact of End User ComputingJohn G. Beatson. 35-45
- PRAJORIS: A Pragmatic Joint Method for Raising the Information Security Level in a CompanySteen Bentzen. 47-60
- The Status of IT Security in Leading European OrganisationsAlan K. Stanley. 61-72
- Findings of the Swedish CITI Project on Information Technology Security Evaluation and CertificationPer Hoving, Mats Ohlin, Jan Rylander. 73-85
- Secure Open Systems: An Investigation of Current Standardisation EffortsPaul L. Overbeek. 87-100
- Network Security: Design of a Global Secure LinkWeijun Wang, Tom Coffey. 101-111
- MAPS - Model for Automated Profile SpecificationDalenca Pottas, Sebastiaan H. von Solms. 113-126
- Cryptography and the Art of Securing TransactionsChristopher L. J. Holloway. 127-137
- Restating the Foundation of Information SecurityDonn B. Parker. 139-151
- Data Security Model for Branch Offices of Big OrganisationsLech J. Janczewski. 153-164
- Practical Security for the Small Computer UserDavid L. H. Bachelor, Peter P. C. H. Kingston. 165-178
- Information Security Awareness - Selling the CauseKevin McLean. 179-193
- A Company s Battle Against the Virus PlaguePeter Capiteijns. 195-204
- How Expert are Auditors in the Computer Security Field? South African Findings and InterpretationsDieter Fink. 205-219
- IS Audit Research: A Paradigm and A FrameworkCharlie Soh, Guy G. Gable. 221-234
- Measuring the Strength of CiphersHelen Gustafson, Ed Dawson, Lauren Nielsen, William J. Caelli. 235-247
- Cryptographic Protocols and Network SecurityPatrick Horster, Hans-Joachim Knobloch. 249-263
- A Solution to Generalized Group Oriented CryptographyChin-Chen Chang, Horng-Chin Lee. 265-275
- A Methodology for Describing Information and Physical Security ArchitecturesWilliam J. Caelli, Dennis Longley, Alan B. Tickle. 277-296
- A Methodology for the Investigation of Computer CrimePhilip M. Stanley. 297-308
- Detering Highly Motivated Computer Abusers: A Field Experiment in Computer SecurityDetmar W. Straub, Patricia J. Carlson, Elizabeth H. Jones. 309-324
- IT Crime - An Intelligence ReportF. Bertil Fortrie. 325-334
- UNIX Operating System SecurityJames L. Clark. 335-343
- DISCO - A Discretionary Security Model for Object-oriented DatabasesMartin S. Olivier, Sebastiaan H. von Solms. 345-357
- Referential Integrity in Multilevel Secure Database Management SystemsVinti Doshi, Sushil Jajodia. 359-371
- A Complex Approach to the Security of Statistical Databases Subject to Off-line Sum QueriesYeow Meng Chee, Andrew Lim. 373-384
- The New Security Paradigm in the Enterprise Computing EnvironmentCraig Rubin. 385-394
- Integrating B2 Security into a UNIX SystemKevin H. Brady. 395-408
- Rule-based Trusted Access ControlMarshall D. Abrams, Ingrid M. Olson. 409-420
- Covernmentware: A New Vehicle to Boost Computer Security on a National LevelChien Siang Yu. 421-432
- A Rule-based Intrusion Detection SystemDon Holden. 433-440
- Access Control - A Further ApproachBurkhard Lau. 441-462
- Computer Crimes: A Study of Different Types of Offences and OffendersBengt Angerfelt. 463-474
- Dealing with Computer Misuse - The Need for an International ApproachMichael R. Jones. 475-489