default search action
Information Management & Computer Security, Volume 13
Volume 13, Number 1, 2005
- Andrew Stewart:
Information security technologies as a commodity input. 5-15 - Alan D. Smith:
Exploring radio frequency identification technology and its impact on business systems. 16-28 - Marijke Coetzee, Jan H. P. Eloff:
An access control framework for web services. 29-38 - Fawad Ahmed, Mohammed Yakoob Siyal:
A novel approach for regenerating a private key using password, fingerprint and smart card. 39-54 - Kostas S. Metaxiotis, Ioannis Zafeiropoulos, Konstantina Nikolinakou, John E. Psarras:
Goal directed project management methodology for the support of ERP implementation and optimal adaptation procedure. 55-71 - Adesina S. Sodiya, H. O. D. Longe, Adio T. Akinwale:
Maintaining privacy in anomaly-based intrusion detection systems. 72-80
Volume 13, Number 2, 2005
- Richard A. Riley Jr., Virginia Franke Kleist:
The biometric technologies business case: a systematic approach. 89-105 - Hsi-Peng Lu, Chin-Lung Hsu, Hsiu-Ying Hsu:
An empirical study of the effect of perceived risk upon intention to use online applications. 106-120 - Stephen C. Shih, H. Joseph Wen:
E-enterprise security management life cycle. 121-134 - Dmitriy V. Chulkov, Mayur S. Desai:
Information technology project failures: Applying the bandit problem to evaluate managerial decision making. 135-143 - Carl Marnewick, Les Labuschagne:
A conceptual model for enterprise resource planning (ERP). 144-155 - A. Al-Ayed, Steven Furnell, D. Zhao, Paul Dowland:
An automated framework for managing security vulnerabilities. 156-166 - Someswar Kesh, M. K. Raja:
Development of a qualitative reasoning model for financial forecasting. 167-179
Volume 13, Number 3, 2005
- J. Redman, Matthew J. Warren, William Hutchinson:
System survivability: a critical security problem. 182-188 - Petros Belsis, Spyros Kokolakis, Evangelos A. Kiountouzis:
Information systems security from a knowledge management perspective. 189-202 - Ingo Stengel, Klaus Peter Fischer, Udo Bleimann, Jeanne Stynes:
Mitigating the mobile agent malicious host problem by using communication patterns. 203-211 - Ioannis Zafeiropoulos, Kostas S. Metaxiotis, Dimitris Askounis:
Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system. 212-234 - Adesina S. Sodiya, H. O. D. Longe:
An improved two-tiered strategy to intrusion detection. 235-243 - Iat Long Alex Lai:
Knowledge management for Chinese medicines: a conceptual model. 244-255
Volume 13, Number 4, 2005
- Andrew Blyth, Paula Thomas:
An XML-based architecture for data integration in vulnerability assessments. 260-273 - Olusegun Folorunso, Adewale Akintayo Ogunde:
Data mining as a technique for knowledge management in business process redesign. 274-280 - Niranjan Pati, Mayur S. Desai:
Conceptualizing strategic issues in information technology outsourcing. 281-296 - Atul Gupta, Rex Hammond:
Information systems security issues and decisions for small businesses: An empirical examination. 297-310 - William Brown, Frank Nasuti:
What ERP systems can tell us about Sarbanes-Oxley. 311-327 - Adil Alsaid, Chris J. Mitchell:
Dynamic content attacks on digital signatures. 328-336
Volume 13, Number 5, 2005
- David C. Chou, Hima Bindu Tripuramallu, Amy Y. Chou:
BI and ERP integration. 340-349 - Jianying Zhou, Jose Antonio Onieva, Javier López:
Optimized multi-party certified email protocols. 350-366 - Oleksiy Mazhelis, Jouni Markkula, Jari Veijalainen:
An integrated identity verification system for mobile terminals. 367-378 - Stefanos Gritzalis:
A good-practice guidance on the use of PKI services in the public sector of the European Union member states. 379-398 - Reyes-G. Gonzalez, Jose Gasco, Juan Llopis:
Information systems outsourcing success factors: a review and some results. 399-418 - Dan Eigeles:
Intelligent authentication, authorization, and administration (I3A). 419-434
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.