Information Security Journal: A Global Perspective
, Volume 17
Volume 17, Number 1, 2008
W. Steve Albrecht
,
Chad Albrecht
,
Conan C. Albrecht
:
Current Trends in Fraud and its Detection.
2-12
Electronic Edition
(link)
BibTeX
Bob Kearney
,
Theodore Tryfonas
:
Security Patterns for Automated Continuous Auditing.
13-25
Electronic Edition
(link)
BibTeX
Stephen Primost
:
Applying Security within a Service-Oriented Architecture.
26-32
Electronic Edition
(link)
BibTeX
Michele Berlot
,
Janche Sang
:
Dealing with Process Overload Attacks in UNIX.
33-44
Electronic Edition
(link)
BibTeX
James E. Weber
,
Dennis Guster
,
Paul Safonov
,
Mark B. Schmidt
:
Weak Password Security: An Empirical Study.
45-54
Electronic Edition
(link)
BibTeX
Volume 17, Number 2, 2008
Azzam Mourad
,
Marc-André Laverdière
,
Mourad Debbabi
:
A High-level Aspect-oriented-based Framework for Software Security Hardening.
56-74
Electronic Edition
(link)
BibTeX
Sanjay Anand
:
Information Security Implications of Sarbanes-Oxley.
75-79
Electronic Edition
(link)
BibTeX
Tommie W. Singleton
,
Aaron J. Singleton
:
The Potential for a Synergistic Relationship Between Information Security and a Financial Audit.
80-86
Electronic Edition
(link)
BibTeX
Rafael Etges
,
Emma Sutcliffe
:
An Overview of Transnational Organized Cyber Crime.
87-94
Electronic Edition
(link)
BibTeX
Andy Luse
,
Kevin P. Scheibe
,
Anthony M. Townsend
:
A Component-Based Framework for Visualization of Intrusion Detection Events.
95-107
Electronic Edition
(link)
BibTeX
Volume 17, Number 3, 2008
Stephen D. Guhl
,
Ravi Pendse
:
The Communications Assistance for Law Enforcement Act (CALEA).
110-113
Electronic Edition
(link)
BibTeX
Santi Phithakkitnukoon
,
Ram Dantu
,
Enkh-Amgalan Baatarjav
:
VoIP Security - Attacks and Solutions.
114-123
Electronic Edition
(link)
BibTeX
Michael Workman
:
Fear Commerce: Inflationary Effects of Global Security Initiatives.
124-131
Electronic Edition
(link)
BibTeX
Chris Bronk
:
Hacking the Nation-State: Security, Information Technology and Policies of Assurance.
132-142
Electronic Edition
(link)
BibTeX
Marianne Hoebich
:
Are Your Computer Files Protected Under the Fourth Amendment?
143-150
Electronic Edition
(link)
BibTeX
Ioannis V. Koskosas
:
Goal Setting and Trust in a Security Management Context.
151-161
Electronic Edition
(link)
BibTeX
Volume 17, Number 4, 2008
Daniil M. Utin
,
Mikhail A. Utin
,
Jane Utin
:
General Misconceptions about Information Security Lead to an Insecure World.
164-169
Electronic Edition
(link)
BibTeX
Sean M. Price
:
Host-Based Security Challenges and Controls: A Survey of Contemporary Research.
170-178
Electronic Edition
(link)
BibTeX
Jonathan Matusitz
:
Cyberterrorism: Postmodern State of Chaos.
179-187
Electronic Edition
(link)
BibTeX
Russ Neal
:
Service-Oriented Security Architecture and its Implications for Security Department Organization Structures.
188-200
Electronic Edition
(link)
BibTeX
John Clark
:
How Secure is Your Hospital's Front Door?
201-202
Electronic Edition
(link)
BibTeX
John R. Rossi
:
Integrity versus Accuracy.
203-205
Electronic Edition
(link)
BibTeX
Volume 17, Number 5&6, 2008
Aggeliki Tsohou
,
Spyros Kokolakis
,
Maria Karyda
,
Evangelos A. Kiountouzis
:
Investigating Information Security Awareness: Research and Practice Gaps.
207-227
Electronic Edition
(link)
BibTeX
Thomas L. Wheeler
:
Organization Security Metrics: Can Organizations Protect Themselves?
228-242
Electronic Edition
(link)
BibTeX
Robert S. Fleming
:
Corporate Expectations of the IT Department in an Age of Terrorism: Ensuring "Battle Readiness".
243-246
Electronic Edition
(link)
BibTeX
Ryan Sherstobitoff
:
Anatomy of a Data Breach.
247-252
Electronic Edition
(link)
BibTeX
Stanley Trepetin
:
Privacy-Preserving String Comparisons in Record Linkage Systems: A Review.
253-266
Electronic Edition
(link)
BibTeX
Michael Workman
,
Richard Ford
,
William Allen
:
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
267-277
Electronic Edition
(link)
BibTeX
Dima Alhadidi
,
Mourad Debbabi
,
Prabir Bhattacharya
:
New AspectJ Pointcuts for Integer Overflow and Underflow Detection.
278-287
Electronic Edition
(link)
BibTeX
Copyright ©
Sun May 17 00:04:48 2009 by
Michael Ley
(
ley@uni-trier.de
)