default search action
Information Management & Computer Security, Volume 9
Volume 9, Number 1, 2001
- H. Joseph Wen, Houn-Gee Chen, Hsin-Ginn Hwang:
E-commerce Web site design: strategies and models. 5-12 - Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen:
Model calculations to estimate the probability of secret reconstruction in computer environments. 13-20 - Euripidis N. Loukis, Diomidis Spinellis:
Information systems security in the Greek public sector. 21-31 - Mariana Gerber, Rossouw von Solms, Paul L. Overbeek:
Formalizing information security requirements. 32-37 - Nong Ye:
Robust intrusion tolerance in information systems. 38-43 - Kostas S. Metaxiotis, John E. Psarras, Dimitris Askounis:
Building ontologies for production scheduling systems: towards a unified methodology. 44-51
Volume 9, Number 2, 2001
- Eddie W. L. Cheng, Heng Li:
Information priority-setting for better resource allocation using analytic hierarchy process (AHP). 61-70 - Stefanos Gritzalis, Dimitris Gritzalis:
A digital seal solution for deploying trust on commercial transactions. 71-79 - David C. Yen, David C. Chou:
Intranets for organizational innovation. 80-87 - Gayle Webb White, Sheila J. Pearson:
Controlling corporate e-mail, PC use and computer security. 88-92 - Steven Furnell, Pelagia Chiliarchaki, Paul Dowland:
Security analysers: administrator assistants or hacker helpers? 93-101
Volume 9, Number 3, 2001
- William Hutchinson, Matthew J. Warren:
Attitudes of Australian information system managers against online attackers. 106-111 - Mangtang Chan, Lam-for Kwok:
Integrating security design into the software development process for e-commerce systems. 112-122 - Say goodbye to the CIO, welcome to the business prophet. 123-125
- Reinhardt A. Botha, Jan H. P. Eloff:
A framework for access control in workflow systems. 126-133 - Muhammed A. Badamas:
Mobile computer systems - security considerations. 134-136
Volume 9, Number 4, 2001
- Dimitrios S. Stamoulis, Dimitris Gouscos, Panagiotis Georgiadis, Drakoulis Martakos:
Revisiting public information management for effective e-government services. 146-153 - Kostas S. Metaxiotis, John E. Psarras, Konstantinos Karnezis:
NUMASS: a Web-based nuclear monitoring system. 154-164 - Godwin J. Udo:
Privacy and security concerns as major barriers for e-commerce: a survey study. 165-174 - H. Arafat Ali:
A new model for monitoring intrusion based on Petri Nets. 175-182 - Theodore Tryfonas, Evangelos A. Kiountouzis, Angeliki Poulymenakou:
Embedding security practices in contemporary information systems development approaches. 183-197
Volume 9, Number 5, 2001
- Pawan Kumar Janbandhu, Mohammed Yakoob Siyal:
Novel biometric digital signatures for Internet-based applications. 205-212 - Christina Costa:
Information technology outsourcing in Australia: a literature review. 213-224 - Mary A. Clark, David C. Chou, David C. Yen:
Domain names management: a strategy for electronic commerce security. 225-232 - Ramesh Kolluru, Paul Meredith:
Security and trust management in supply chains. 233-236 - Martin Botha, Rossouw von Solms:
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept. 237-242 - Margaret A. Hurley:
IT outsourcing - managing the key asset. 243-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.