default search action
Information Management & Computer Security, Volume 8
Volume 8, Number 1, 2000
- Stefanos Gritzalis, John Iliadis, Spyros Oikonomopoulos:
Distributed component software security issues on deploying a secure electronic marketplace. 5-13 - Md. Mahbubur Rahim, Mohd. Noah Abd. Rahman, Afzaal H. Seyal:
Software piracy among academics: an empirical study in Brunei Darussalam. 14-26 - William M. Lankford, Jack E. Johnson:
EDI via the Internet. 27-30 - Mikko T. Siponen:
A conceptual foundation for organizational information security awareness. 31-41 - Mohsen Attaran:
Voice recognition software programs: are they right for you? 42-44
Volume 8, Number 2, 2000
- Schubert Foo, Mark Hepworth:
The implementation of an electronic survey tool to help determine the information needs of a knowledge-based organization. 53-64 - Steven Furnell, Paul Dowland:
A conceptual architecture for real-time intrusion monitoring. 65-75 - Kostas S. Metaxiotis, Emanuel Samouilidis:
Expert systems in medicine: academic illusion or real power? 75-79 - Wing S. Chow:
Success factors for IS disaster recovery planning in Hong Kong. 80-87 - Mitsuru Kodama:
New regional community creation through video-based information networks - a case study of regional vitalization through the promotion of information technology in Japan. 87-97 - Mohsen Attaran:
Managing legal liability of the Net: a ten step guide for IT managers. 98-100
Volume 8, Number 3, 2000
- Spyros Kokolakis, A. J. Demopoulos, Evangelos A. Kiountouzis:
The use of business process modelling in information systems security analysis and design. 107-116 - Marilyn M. Helms, Lawrence P. Ettkin, Daniel J. Morris:
Shielding your company against information compromise. 117-130 - Steve Hawkins, David C. Yen, David C. Chou:
Awareness and challenges of Internet security. 131-143 - Bowon Kim, Heungshik Oh:
An exploratory inquiry into the perceived effectiveness of a global information system. 144-154 - Les Labuschagne, Jan H. P. Eloff:
Electronic commerce: the information-security challenge. 154-157
Volume 8, Number 4, 2000
- Daniel J. Morris, Lawrence P. Ettkin, Marilyn M. Helms:
Issues in the illegal transference of US information technologies. 164-173 - Costas Lambrinoudakis:
Smart card technology for deploying a secure information management framework. 173-183 - Gurpreet Dhillon, Mário M. Caldeira:
Interpreting the adoption and use of EDI in the Portuguese clothing and textile industry. 184-188
Volume 8, Number 5, 2000
- Mikko T. Siponen:
Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice. 197-209 - Lech J. Janczewski, Victor Portougal:
"Need-to-know" principle and fuzzy security clearances modelling. 210-217 - Karen A. Forcht:
Security-related concerns with geographic information systems and geographic mapping. 218-221 - Steve M. Hawkins, David C. Yen, David C. Chou:
Disaster recovery planning: a strategy for data security. 222-230 - Stuart Maguire:
Towards a "business-led" approach to information systems development. 230-238 - Sanjeev Phukan, Gurpreet Dhillon:
Ethics and information technology use: a survey of US based SMEs. 239-243 - Mike Turega:
Issues with information dissemination on global networks. 244-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.