


default search action
Information Security Journal: A Global Perspective, Volume 17
Volume 17, Number 1, 2008
- W. Steve Albrecht, Chad Albrecht, Conan C. Albrecht:

Current Trends in Fraud and its Detection. 2-12 - Bob Kearney, Theodore Tryfonas

:
Security Patterns for Automated Continuous Auditing. 13-25 - Stephen Primost:

Applying Security within a Service-Oriented Architecture. 26-32 - Michele Berlot, Janche Sang:

Dealing with Process Overload Attacks in UNIX. 33-44 - James E. Weber, Dennis C. Guster, Paul Safonov

, Mark B. Schmidt:
Weak Password Security: An Empirical Study. 45-54
Volume 17, Number 2, 2008
- Azzam Mourad

, Marc-André Laverdière, Mourad Debbabi
:
A High-level Aspect-oriented-based Framework for Software Security Hardening. 56-74 - Sanjay Anand:

Information Security Implications of Sarbanes-Oxley. 75-79 - Tommie W. Singleton, Aaron J. Singleton:

The Potential for a Synergistic Relationship Between Information Security and a Financial Audit. 80-86 - Rafael Etges, Emma Sutcliffe:

An Overview of Transnational Organized Cyber Crime. 87-94 - Andy Luse, Kevin P. Scheibe

, Anthony M. Townsend:
A Component-Based Framework for Visualization of Intrusion Detection Events. 95-107
Volume 17, Number 3, 2008
- Stephen D. Guhl, Ravi Pendse:

The Communications Assistance for Law Enforcement Act (CALEA). 110-113 - Santi Phithakkitnukoon

, Ram Dantu, Enkh-Amgalan Baatarjav:
VoIP Security - Attacks and Solutions. 114-123 - Michael Workman:

Fear Commerce: Inflationary Effects of Global Security Initiatives. 124-131 - Chris Bronk:

Hacking the Nation-State: Security, Information Technology and Policies of Assurance. 132-142 - Marianne Hoebich:

Are Your Computer Files Protected Under the Fourth Amendment? 143-150 - Ioannis V. Koskosas:

Goal Setting and Trust in a Security Management Context. 151-161
Volume 17, Number 4, 2008
- Daniil M. Utin, Mikhail A. Utin, Jane Utin:

General Misconceptions about Information Security Lead to an Insecure World. 164-169 - Sean M. Price:

Host-Based Security Challenges and Controls: A Survey of Contemporary Research. 170-178 - Jonathan Matusitz:

Cyberterrorism: Postmodern State of Chaos. 179-187 - Russ Neal:

Service-Oriented Security Architecture and its Implications for Security Department Organization Structures. 188-200 - John Clark:

How Secure is Your Hospital's Front Door? 201-202 - John R. Rossi:

Integrity versus Accuracy. 203-205
Volume 17, Number 5&6, 2008
- Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos A. Kiountouzis:

Investigating Information Security Awareness: Research and Practice Gaps. 207-227 - Thomas L. Wheeler:

Organization Security Metrics: Can Organizations Protect Themselves? 228-242 - Robert S. Fleming:

Corporate Expectations of the IT Department in an Age of Terrorism: Ensuring "Battle Readiness". 243-246 - Ryan Sherstobitoff:

Anatomy of a Data Breach. 247-252 - Stanley Trepetin:

Privacy-Preserving String Comparisons in Record Linkage Systems: A Review. 253-266 - Michael Workman, Richard Ford, William H. Allen:

A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks. 267-277 - Dima Alhadidi, Mourad Debbabi

, Prabir Bhattacharya:
New AspectJ Pointcuts for Integer Overflow and Underflow Detection. 278-287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














