default search action
Information Management & Computer Security, Volume 12
Volume 12, Number 1, 2004
- Dimitris Gritzalis:
Embedding privacy in IT applications development. 8-26 - Adesina S. Sodiya, H. O. D. Longe, Adio T. Akinwale:
A new two-tiered strategy to intrusion detection. 27-44 - Kostas Maris, Kostas S. Metaxiotis, G. Pantou, Konstantinos Nikolopoulos, Eleni Tavanidou, Vassilis Assimakopoulos:
D-TIFIS: a decision support system for options trading. 45-65 - S. Srinivasan:
Role of trust in e-business success. 66-72 - Jau-Yang Liu, Jyh-Horng Michael Tarn, H. Joseph Wen:
Adopting e-commerce Web site operation modes: The current state of large US firms. 73-90 - Vassilis Tsoumas, Theodore Tryfonas:
From risk analysis to effective security management: towards an automated approach. 91-101 - William T. Rupp, Alan D. Smith:
Exploring the impacts of P2P networks on the entertainment industry. 102-116 - Moncef Belhadjali, Gary L. Whaley:
A data mining approach to neural network training. 117-124 - Vasilios Zorkadis, P. Donos:
On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. 125-137
Volume 12, Number 2, 2004
- Thomas von der Embse, Mayur S. Desai, Seema Desai:
How well are corporate ethics codes and policies applied in the trenches? Key factors and conditions. 146-153 - C. Bryan Foltz:
Cyberterrorism, computer crime, and reality. 154-166 - Sonja Petrovic-Lazarevic, Amrik S. Sohal:
Nature of e-business ethical dilemmas. 167-177 - Steven Furnell, I. Papadopoulos, Paul Dowland:
A long-term trial of alternative user authentication technologies. 178-190 - Sajjad ur Rehman, Laila Marouf:
Human resources for information management operations in Kuwaiti corporate companies. 191-201
Volume 12, Number 3, 2004
- Billy B. L. Lim, Yan Sun, Joaquin Vila:
Incorporating WS-Security into a Web services-based portal. 206-217 - Kostas S. Metaxiotis:
RECOT: an expert system for the reduction of environmental cost in the textile industry. 218-227 - Muhammad A. Razi, J. Michael Tarn, Faisal A. Siddiqui:
Exploring the failure and success of DotComs. 228-244 - Bouchaib Bahli, Younes Benslimane:
An exploration of wireless computing risks: Development of a risk taxonomy. 245-254 - Stefanos Gritzalis:
Enhancing Web privacy and anonymity in the digital era. 255-287 - Fritz H. Grupe, Simon Jooste:
Genetic algorithms: A business perspective. 288-297
Volume 12, Number 4, 2004
- Hooshang M. Beheshti:
The impact of IT on SMEs in the United States. 318-327 - Jacques Botha, Rossouw von Solms:
A cyclic approach to business continuity planning. 328-337 - David C. Chou, Xin Tan, David C. Yen:
Web technology and supply chain management. 338-349 - Konstantinos Moulinos, John Iliadis, Vassilis Tsoumas:
Towards secure sealing of privacy policies. 350-361 - Stuart Maguire:
Reconciling the system requirements process in changing business environments. 362-372
Volume 12, Number 5, 2004
- Xing-fen Wang, Yi-jun Li:
Formal definition and implementation of business-oriented SoD access control policy. 379-388 - Ning Zhao, David C. Yen, I-Chiu Chang:
Auditing in the e-commerce era. 389-400 - Mayur S. Desai, Kiran J. Desai, Lucy Ojode:
A global information technology model: business applications in developing economies (case studies). 401-410 - Sanjay Rawat, Ved Prakash Gulati, Arun K. Pujari:
Frequency- and ordering-based similarity measure for host-based intrusion detection. 411-421
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.