Volume 17, Number 1, 1998
: High-tech security and the failings of president clinton's commission on critical infrastructure protection.
: Software pirating and management's quagmire.
Volume 17, Number 2, 1998
: The ten commandments of security.
: Reducing charges of E-comm harassment.
Volume 17, Number 3, 1998
, T. Newe
: Realisation of a minimum-knowledge identification and signature scheme.
Volume 17, Number 4, 1998
: Balancing legal concerns over crime and security in cyberspace.
: A conceptual framework for information security management.
: Further developments in the field of encryption and digital signatures.
Volume 17, Number 5, 1998
: Techno-crimes: Failings of the legal edifice.
: European commission takes action to secure the internet.
: The three categories of decision-making and information security.
Volume 17, Number 6, 1998
: Privacy and security - The drivers for growth of E-Commerce.
: The Annual Report of the UK Data Protection Registrar.
: A note on the role of deception in information protection.
: Creating security applications based on The Global Certificate Management System.
Volume 17, Number 7, 1998
: Windows-98, RIP and my Adrenaline Rush.
Gerald L. Kovacich
: Establishing an Information Systems Security Organization (ISSO).
Volume 17, Number 8, 1998
: Employee abuses in cyberspace: Management's legal quagmire.
: Time, history and war: A personal voyage through Compsec '98.
H. S. Venter
, Jan H. P. Eloff
: Data packet intercepting on the internet: How and why? A closer look at existing data packet-intercepting tools.
: Time-based security explained: Provable security models and formulas for the practitioner and vendor.