-
1
-
-
27644444688
-
A new approach for building secure applications based on internal infrastructure
-
Ali, H.A. (2005) 'A new approach for building secure applications based on internal infrastructure, Int. J Computer Applications in Technology, Vol. 24, pp. 144-155.
-
(2005)
Int. J Computer Applications in Technology
, vol.24
, pp. 144-155
-
-
Ali, H.A.1
-
2
-
-
33644542600
-
A usability study of internet privacy policies for state and commercial website
-
Becker, S.A. (2004) 'A usability study of internet privacy policies for state and commercial website', Int. J. Service and Standards, Vol. 1, pp.52-68.
-
(2004)
Int. J. Service and Standards
, vol.1
, pp. 52-68
-
-
Becker, S.A.1
-
3
-
-
34547124969
-
-
BSI, BS 7799-1 (1999a) 'Information Security Management Part 1: Code of Practice for Information Security Management System', British Security Institute: UK.
-
BSI, BS 7799-1 (1999a) 'Information Security Management Part 1: Code of Practice for Information Security Management System', British Security Institute: UK.
-
-
-
-
4
-
-
34547109998
-
-
BSI, BS 7799-2 (1999b) 'Information Security Management Part 2: Specification for Information Security Management System', British Security Institute: UK.
-
BSI, BS 7799-2 (1999b) 'Information Security Management Part 2: Specification for Information Security Management System', British Security Institute: UK.
-
-
-
-
6
-
-
34547111417
-
Computer crime and security: The perceptions and experiences of corporate security directors
-
Carter, D.L. and Katz, A.J. (1996) 'Computer crime and security: the perceptions and experiences of corporate security directors', Security Journal, Vol. 7, pp. 101-108.
-
(1996)
Security Journal
, vol.7
, pp. 101-108
-
-
Carter, D.L.1
Katz, A.J.2
-
7
-
-
84969446893
-
Cyber security management and e-government
-
Chen, YS., Chong, P.P. and Zhang, B. (2004) 'Cyber security management and e-government', Electronic Government, an International Journal, Vol. 1, pp.316-327.
-
(2004)
Electronic Government, an International Journal
, vol.1
, pp. 316-327
-
-
Chen, Y.S.1
Chong, P.P.2
Zhang, B.3
-
8
-
-
0030417096
-
The information security chain in a company
-
Finne, T. (1996) 'The information security chain in a company', Computer and Seeurity, Vol. 15, pp.297-316.
-
(1996)
Computer and Seeurity
, vol.15
, pp. 297-316
-
-
Finne, T.1
-
9
-
-
34547093061
-
-
ISM Information security management, Account and Password Management Policy Version 1.4, 03/2004, University of Auckland, New Zealand. Available at: http://www
-
ISM (Information security management), Account and Password Management Policy Version 1.4, 03/2004, University of Auckland, New Zealand. Available at: http://www.auckland.ac.nz/security/policies and statutes.htm
-
-
-
-
11
-
-
34547135575
-
Information technology, - Securitv Techniques Code of Practice.1br Information
-
ISO
-
ISO (2000) Information technology, - Securitv Techniques Code of Practice.1br Information Security Management, ISO 1799:2000(E).
-
(2000)
Security Management
, vol.ISO 1799
-
-
-
13
-
-
1442303690
-
Development of a measure for the information technology infrastructure construct
-
Lewis, B.R. and Byrd, T.A. (2003) 'Development of a measure for the information technology infrastructure construct', European Journal of Information Systems, Vol. 12, pp.93-109.
-
(2003)
European Journal of Information Systems
, vol.12
, pp. 93-109
-
-
Lewis, B.R.1
Byrd, T.A.2
-
14
-
-
34547124715
-
-
NSTISSI (National Security Telecommunications and Information Systems Security Instruction) (1999) No. 4009, January.
-
NSTISSI (National Security Telecommunications and Information Systems Security Instruction) (1999) No. 4009, January.
-
-
-
-
15
-
-
34547121848
-
Middleware for semantic-based security and safety management of open services
-
Poslad, S., Tan, J.J., Huang, X. and Zuo, L. (2005) 'Middleware for semantic-based security and safety management of open services', Int. J Web and Grid Services, Vol. 1, pp.305-327.
-
(2005)
Int. J Web and Grid Services
, vol.1
, pp. 305-327
-
-
Poslad, S.1
Tan, J.J.2
Huang, X.3
Zuo, L.4
-
16
-
-
0041983746
-
Management tradeoffs in anti-virus strategies
-
Post, G. and Kagan, A. (2000) 'Management tradeoffs in anti-virus strategies', Information and Management, Vol. 37, pp. 13-24.
-
(2000)
Information and Management
, vol.37
, pp. 13-24
-
-
Post, G.1
Kagan, A.2
-
18
-
-
33645901634
-
An assessment of biometric identities as a standard for e-govem ment services
-
Scott, M., Action, T. and Hughes, M. (2005) 'An assessment of biometric identities as a standard for e-govem ment services', Int. J. Service and Standards, Vol. 1, pp.271-286.
-
(2005)
Int. J. Service and Standards
, vol.1
, pp. 271-286
-
-
Scott, M.1
Action, T.2
Hughes, M.3
-
19
-
-
33644533193
-
Electronic data interchange and financial electronic data interchange: Threats and opportunities for financial accounting
-
Seetharaman, A., Sreenivasan, J. and Murugeson, M. (2006) 'Electronic data interchange and financial electronic data interchange: threats and opportunities for financial accounting', Int. J. Services and Standards, Vol. 2, pp. 137-153.
-
(2006)
Int. J. Services and Standards
, vol.2
, pp. 137-153
-
-
Seetharaman, A.1
Sreenivasan, J.2
Murugeson, M.3
-
20
-
-
34249087381
-
Integrated e-enterprise security design and implementation: A case study of e-service in Supply chain management
-
Shin, S.C. and Wen, H.J. (2005) 'Integrated e-enterprise security design and implementation: a case study of e-service in Supply chain management', Int. J Electronic Business, Vol. 3, pp. 154-173.
-
(2005)
Int. J Electronic Business
, vol.3
, pp. 154-173
-
-
Shin, S.C.1
Wen, H.J.2
-
21
-
-
33745040092
-
Linking secure reverse auction with web service
-
Shin, D.H., Huang, S.Y and Lin, B. (2006) Linking secure reverse auction with web service', Int. J. Services and Standard, Vol. 2, pp. 15-31.
-
(2006)
Int. J. Services and Standard
, vol.2
, pp. 15-31
-
-
Shin, D.H.1
Huang, S.Y.2
Lin, B.3
-
22
-
-
33745027520
-
Exploring the acceptability of biometrics and fingerprint technologies
-
Smith, A.D. (2005) 'Exploring the acceptability of biometrics and fingerprint technologies', Int. J Services andStandards, Vol. 1, pp.453-481.
-
(2005)
Int. J Services andStandards
, vol.1
, pp. 453-481
-
-
Smith, A.D.1
|