C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Inf. Manag. Comput. Security
2005
2005
2005
Keyphrases
Publications
volume 13, number 1, 2005
Adesina S. Sodiya
,
H. O. D. Longe
,
Adio T. Akinwale
Maintaining privacy in anomaly-based intrusion detection systems.
Inf. Manag. Comput. Security
13 (1) (2005)
Marijke Coetzee
,
Jan H. P. Eloff
An access control framework for web services.
Inf. Manag. Comput. Security
13 (1) (2005)
Fawad Ahmed
,
Mohammed Yakoob Siyal
A novel approach for regenerating a private key using password, fingerprint and smart card.
Inf. Manag. Comput. Security
13 (1) (2005)
Kostas S. Metaxiotis
,
Ioannis Zafeiropoulos
,
Konstantina Nikolinakou
,
John E. Psarras
Goal directed project management methodology for the support of ERP implementation and optimal adaptation procedure.
Inf. Manag. Comput. Security
13 (1) (2005)
Alan D. Smith
Exploring radio frequency identification technology and its impact on business systems.
Inf. Manag. Comput. Security
13 (1) (2005)
Andrew Stewart
Information security technologies as a commodity input.
Inf. Manag. Comput. Security
13 (1) (2005)
volume 13, number 2, 2005
Carl Marnewick
,
Les Labuschagne
A conceptual model for enterprise resource planning (ERP).
Inf. Manag. Comput. Security
13 (2) (2005)
Dmitriy V. Chulkov
,
Mayur S. Desai
Information technology project failures: Applying the bandit problem to evaluate managerial decision making.
Inf. Manag. Comput. Security
13 (2) (2005)
Someswar Kesh
,
M. K. Raja
Development of a qualitative reasoning model for financial forecasting.
Inf. Manag. Comput. Security
13 (2) (2005)
Richard A. Riley Jr.
,
Virginia Franke Kleist
The biometric technologies business case: a systematic approach.
Inf. Manag. Comput. Security
13 (2) (2005)
Hsi-Peng Lu
,
Chin-Lung Hsu
,
Hsiu-Ying Hsu
An empirical study of the effect of perceived risk upon intention to use online applications.
Inf. Manag. Comput. Security
13 (2) (2005)
A. Al-Ayed
,
Steven Furnell
,
D. Zhao
,
Paul Dowland
An automated framework for managing security vulnerabilities.
Inf. Manag. Comput. Security
13 (2) (2005)
Stephen C. Shih
,
H. Joseph Wen
E-enterprise security management life cycle.
Inf. Manag. Comput. Security
13 (2) (2005)
volume 13, number 3, 2005
J. Redman
,
Matthew J. Warren
,
William Hutchinson
System survivability: a critical security problem.
Inf. Manag. Comput. Security
13 (3) (2005)
Ingo Stengel
,
Klaus Peter Fischer
,
Udo Bleimann
,
Jeanne Stynes
Mitigating the mobile agent malicious host problem by using communication patterns.
Inf. Manag. Comput. Security
13 (3) (2005)
Ioannis Zafeiropoulos
,
Kostas S. Metaxiotis
,
Dimitris Askounis
Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system.
Inf. Manag. Comput. Security
13 (3) (2005)
Petros Belsis
,
Spyros Kokolakis
,
Evangelos A. Kiountouzis
Information systems security from a knowledge management perspective.
Inf. Manag. Comput. Security
13 (3) (2005)
Adesina S. Sodiya
,
H. O. D. Longe
An improved two-tiered strategy to intrusion detection.
Inf. Manag. Comput. Security
13 (3) (2005)
Iat Long Alex Lai
Knowledge management for Chinese medicines: a conceptual model.
Inf. Manag. Comput. Security
13 (3) (2005)
volume 13, number 4, 2005
Adil Alsaid
,
Chris J. Mitchell
Dynamic content attacks on digital signatures.
Inf. Manag. Comput. Security
13 (4) (2005)
Niranjan Pati
,
Mayur S. Desai
Conceptualizing strategic issues in information technology outsourcing.
Inf. Manag. Comput. Security
13 (4) (2005)
Atul Gupta
,
Rex Hammond
Information systems security issues and decisions for small businesses: An empirical examination.
Inf. Manag. Comput. Security
13 (4) (2005)
Andrew Blyth
,
Paula Thomas
An XML-based architecture for data integration in vulnerability assessments.
Inf. Manag. Comput. Security
13 (4) (2005)
William Brown
,
Frank Nasuti
What ERP systems can tell us about Sarbanes-Oxley.
Inf. Manag. Comput. Security
13 (4) (2005)
Olusegun Folorunso
,
Adewale Akintayo Ogunde
Data mining as a technique for knowledge management in business process redesign.
Inf. Manag. Comput. Security
13 (4) (2005)
volume 13, number 5, 2005
Oleksiy Mazhelis
,
Jouni Markkula
,
Jari Veijalainen
An integrated identity verification system for mobile terminals.
Inf. Manag. Comput. Security
13 (5) (2005)
Dan Eigeles
Intelligent authentication, authorization, and administration (I3A).
Inf. Manag. Comput. Security
13 (5) (2005)
Stefanos Gritzalis
A good-practice guidance on the use of PKI services in the public sector of the European Union member states.
Inf. Manag. Comput. Security
13 (5) (2005)
David C. Chou
,
Hima Bindu Tripuramallu
,
Amy Y. Chou
BI and ERP integration.
Inf. Manag. Comput. Security
13 (5) (2005)
Reyes-G. Gonzalez
,
Jose Gasco
,
Juan Llopis
Information systems outsourcing success factors: a review and some results.
Inf. Manag. Comput. Security
13 (5) (2005)
Jianying Zhou
,
Jose Antonio Onieva
,
Javier López
Optimized multi-party certified email protocols.
Inf. Manag. Comput. Security
13 (5) (2005)