default search action
Information Security Journal: A Global Perspective, Volume 17
Volume 17, Number 1, 2008
- W. Steve Albrecht, Chad Albrecht, Conan C. Albrecht:
Current Trends in Fraud and its Detection. 2-12 - Bob Kearney, Theodore Tryfonas:
Security Patterns for Automated Continuous Auditing. 13-25 - Stephen Primost:
Applying Security within a Service-Oriented Architecture. 26-32 - Michele Berlot, Janche Sang:
Dealing with Process Overload Attacks in UNIX. 33-44 - James E. Weber, Dennis C. Guster, Paul Safonov, Mark B. Schmidt:
Weak Password Security: An Empirical Study. 45-54
Volume 17, Number 2, 2008
- Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A High-level Aspect-oriented-based Framework for Software Security Hardening. 56-74 - Sanjay Anand:
Information Security Implications of Sarbanes-Oxley. 75-79 - Tommie W. Singleton, Aaron J. Singleton:
The Potential for a Synergistic Relationship Between Information Security and a Financial Audit. 80-86 - Rafael Etges, Emma Sutcliffe:
An Overview of Transnational Organized Cyber Crime. 87-94 - Andy Luse, Kevin P. Scheibe, Anthony M. Townsend:
A Component-Based Framework for Visualization of Intrusion Detection Events. 95-107
Volume 17, Number 3, 2008
- Stephen D. Guhl, Ravi Pendse:
The Communications Assistance for Law Enforcement Act (CALEA). 110-113 - Santi Phithakkitnukoon, Ram Dantu, Enkh-Amgalan Baatarjav:
VoIP Security - Attacks and Solutions. 114-123 - Michael Workman:
Fear Commerce: Inflationary Effects of Global Security Initiatives. 124-131 - Chris Bronk:
Hacking the Nation-State: Security, Information Technology and Policies of Assurance. 132-142 - Marianne Hoebich:
Are Your Computer Files Protected Under the Fourth Amendment? 143-150 - Ioannis V. Koskosas:
Goal Setting and Trust in a Security Management Context. 151-161
Volume 17, Number 4, 2008
- Daniil M. Utin, Mikhail A. Utin, Jane Utin:
General Misconceptions about Information Security Lead to an Insecure World. 164-169 - Sean M. Price:
Host-Based Security Challenges and Controls: A Survey of Contemporary Research. 170-178 - Jonathan Matusitz:
Cyberterrorism: Postmodern State of Chaos. 179-187 - Russ Neal:
Service-Oriented Security Architecture and its Implications for Security Department Organization Structures. 188-200 - John Clark:
How Secure is Your Hospital's Front Door? 201-202 - John R. Rossi:
Integrity versus Accuracy. 203-205
Volume 17, Number 5&6, 2008
- Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:
Investigating Information Security Awareness: Research and Practice Gaps. 207-227 - Thomas L. Wheeler:
Organization Security Metrics: Can Organizations Protect Themselves? 228-242 - Robert S. Fleming:
Corporate Expectations of the IT Department in an Age of Terrorism: Ensuring "Battle Readiness". 243-246 - Ryan Sherstobitoff:
Anatomy of a Data Breach. 247-252 - Stanley Trepetin:
Privacy-Preserving String Comparisons in Record Linkage Systems: A Review. 253-266 - Michael Workman, Richard Ford, William H. Allen:
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks. 267-277 - Dima Alhadidi, Mourad Debbabi, Prabir Bhattacharya:
New AspectJ Pointcuts for Integer Overflow and Underflow Detection. 278-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.