callback( { "result":{ "query":":facetid:toc:\"db/journals/imcs/imcs12.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"205.57" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"29", "@dc":"29", "@oc":"29", "@id":"43347571", "text":":facetid:toc:db/journals/imcs/imcs12.bht" } }, "hits":{ "@total":"29", "@computed":"29", "@sent":"29", "@first":"0", "hit":[{ "@score":"1", "@id":"5962255", "info":{"authors":{"author":[{"@pid":"70/2044","text":"Bouchaib Bahli"},{"@pid":"18/6381","text":"Younes Benslimane"}]},"title":"An exploration of wireless computing risks: Development of a risk taxonomy.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"3","pages":"245-254","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/BahliB04","doi":"10.1108/09685220410542606","ee":"https://doi.org/10.1108/09685220410542606","url":"https://dblp.org/rec/journals/imcs/BahliB04"}, "url":"URL#5962255" }, { "@score":"1", "@id":"5962256", "info":{"authors":{"author":{"@pid":"62/7462","text":"Hooshang M. Beheshti"}},"title":"The impact of IT on SMEs in the United States.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"4","pages":"318-327","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Beheshti04","doi":"10.1108/09685220410553532","ee":"https://doi.org/10.1108/09685220410553532","url":"https://dblp.org/rec/journals/imcs/Beheshti04"}, "url":"URL#5962256" }, { "@score":"1", "@id":"5962257", "info":{"authors":{"author":[{"@pid":"37/268","text":"Moncef Belhadjali"},{"@pid":"68/31","text":"Gary L. Whaley"}]},"title":"A data mining approach to neural network training.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"117-124","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/BelhadjaliW04","doi":"10.1108/09685220410518874","ee":"https://doi.org/10.1108/09685220410518874","url":"https://dblp.org/rec/journals/imcs/BelhadjaliW04"}, "url":"URL#5962257" }, { "@score":"1", "@id":"5962258", "info":{"authors":{"author":[{"@pid":"45/427","text":"Jacques Botha"},{"@pid":"89/3539","text":"Rossouw von Solms"}]},"title":"A cyclic approach to business continuity planning.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"4","pages":"328-337","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/BothaS04","doi":"10.1108/09685220410553541","ee":"https://doi.org/10.1108/09685220410553541","url":"https://dblp.org/rec/journals/imcs/BothaS04"}, "url":"URL#5962258" }, { "@score":"1", "@id":"5962259", "info":{"authors":{"author":[{"@pid":"15/4311","text":"David C. Chou"},{"@pid":"89/6413","text":"Xin Tan"},{"@pid":"03/4461","text":"David C. Yen"}]},"title":"Web technology and supply chain management.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"4","pages":"338-349","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/ChouTY04","doi":"10.1108/09685220410553550","ee":"https://doi.org/10.1108/09685220410553550","url":"https://dblp.org/rec/journals/imcs/ChouTY04"}, "url":"URL#5962259" }, { "@score":"1", "@id":"5962260", "info":{"authors":{"author":[{"@pid":"57/1647","text":"Mayur S. Desai"},{"@pid":"49/1473","text":"Kiran J. Desai"},{"@pid":"95/7463","text":"Lucy Ojode"}]},"title":"A global information technology model: business applications in developing economies (case studies).","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"5","pages":"401-410","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/DesaiDO04","doi":"10.1108/09685220410563388","ee":"https://doi.org/10.1108/09685220410563388","url":"https://dblp.org/rec/journals/imcs/DesaiDO04"}, "url":"URL#5962260" }, { "@score":"1", "@id":"5962261", "info":{"authors":{"author":[{"@pid":"51/5580","text":"Thomas von der Embse"},{"@pid":"57/1647","text":"Mayur S. Desai"},{"@pid":"58/1499","text":"Seema Desai"}]},"title":"How well are corporate ethics codes and policies applied in the trenches? Key factors and conditions.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"2","pages":"146-153","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/EmbseDD04","doi":"10.1108/09685220410530780","ee":"https://doi.org/10.1108/09685220410530780","url":"https://dblp.org/rec/journals/imcs/EmbseDD04"}, "url":"URL#5962261" }, { "@score":"1", "@id":"5962262", "info":{"authors":{"author":{"@pid":"38/4061","text":"C. Bryan Foltz"}},"title":"Cyberterrorism, computer crime, and reality.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"2","pages":"154-166","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Foltz04","doi":"10.1108/09685220410530799","ee":"https://doi.org/10.1108/09685220410530799","url":"https://dblp.org/rec/journals/imcs/Foltz04"}, "url":"URL#5962262" }, { "@score":"1", "@id":"5962263", "info":{"authors":{"author":[{"@pid":"83/2392","text":"Steven Furnell"},{"@pid":"28/6758","text":"I. Papadopoulos"},{"@pid":"24/409","text":"Paul Dowland 0001"}]},"title":"A long-term trial of alternative user authentication technologies.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"2","pages":"178-190","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/FurnellPD04","doi":"10.1108/09685220410530816","ee":"https://doi.org/10.1108/09685220410530816","url":"https://dblp.org/rec/journals/imcs/FurnellPD04"}, "url":"URL#5962263" }, { "@score":"1", "@id":"5962264", "info":{"authors":{"author":{"@pid":"48/4664","text":"Dimitris Gritzalis"}},"title":"Embedding privacy in IT applications development.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"8-26","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Gritzalis04","doi":"10.1108/09685220410518801","ee":"https://doi.org/10.1108/09685220410518801","url":"https://dblp.org/rec/journals/imcs/Gritzalis04"}, "url":"URL#5962264" }, { "@score":"1", "@id":"5962265", "info":{"authors":{"author":{"@pid":"83/4094","text":"Stefanos Gritzalis"}},"title":"Enhancing Web privacy and anonymity in the digital era.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"3","pages":"255-287","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Gritzalis04a","doi":"10.1108/09685220410542615","ee":"https://doi.org/10.1108/09685220410542615","url":"https://dblp.org/rec/journals/imcs/Gritzalis04a"}, "url":"URL#5962265" }, { "@score":"1", "@id":"5962266", "info":{"authors":{"author":[{"@pid":"31/5655","text":"Fritz H. Grupe"},{"@pid":"18/6523","text":"Simon Jooste"}]},"title":"Genetic algorithms: A business perspective.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"3","pages":"288-297","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/GrupeJ04","doi":"10.1108/09685220410542624","ee":"https://doi.org/10.1108/09685220410542624","url":"https://dblp.org/rec/journals/imcs/GrupeJ04"}, "url":"URL#5962266" }, { "@score":"1", "@id":"5962267", "info":{"authors":{"author":[{"@pid":"78/4590","text":"Billy B. L. Lim"},{"@pid":"181/2323","text":"Yan Sun"},{"@pid":"14/52","text":"Joaquin Vila"}]},"title":"Incorporating WS-Security into a Web services-based portal.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"3","pages":"206-217","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/LimSV04","doi":"10.1108/09685220410542570","ee":"https://doi.org/10.1108/09685220410542570","url":"https://dblp.org/rec/journals/imcs/LimSV04"}, "url":"URL#5962267" }, { "@score":"1", "@id":"5962268", "info":{"authors":{"author":[{"@pid":"79/4768","text":"Jau-Yang Liu"},{"@pid":"84/1263","text":"Jyh-Horng Michael Tarn"},{"@pid":"04/6731","text":"H. Joseph Wen"}]},"title":"Adopting e-commerce Web site operation modes: The current state of large US firms.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"73-90","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/LiuTW04","doi":"10.1108/09685220410518847","ee":"https://doi.org/10.1108/09685220410518847","url":"https://dblp.org/rec/journals/imcs/LiuTW04"}, "url":"URL#5962268" }, { "@score":"1", "@id":"5962269", "info":{"authors":{"author":{"@pid":"47/2412","text":"Stuart Maguire"}},"title":"Reconciling the system requirements process in changing business environments.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"4","pages":"362-372","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Maguire04","doi":"10.1108/09685220410553578","ee":"https://doi.org/10.1108/09685220410553578","url":"https://dblp.org/rec/journals/imcs/Maguire04"}, "url":"URL#5962269" }, { "@score":"1", "@id":"5962270", "info":{"authors":{"author":[{"@pid":"82/3766","text":"Kostas Maris"},{"@pid":"23/865","text":"Kostas S. Metaxiotis"},{"@pid":"68/1085","text":"G. Pantou"},{"@pid":"n/KonstantinosNikolopoulos","text":"Konstantinos Nikolopoulos"},{"@pid":"86/6029","text":"Eleni Tavanidou"},{"@pid":"26/75","text":"Vassilis Assimakopoulos"}]},"title":"D-TIFIS: a decision support system for options trading.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"45-65","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/MarisMPNTA04","doi":"10.1108/09685220410518829","ee":"https://doi.org/10.1108/09685220410518829","url":"https://dblp.org/rec/journals/imcs/MarisMPNTA04"}, "url":"URL#5962270" }, { "@score":"1", "@id":"5962271", "info":{"authors":{"author":{"@pid":"23/865","text":"Kostas S. Metaxiotis"}},"title":"RECOT: an expert system for the reduction of environmental cost in the textile industry.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"3","pages":"218-227","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Metaxiotis04","doi":"10.1108/09685220410542589","ee":"https://doi.org/10.1108/09685220410542589","url":"https://dblp.org/rec/journals/imcs/Metaxiotis04"}, "url":"URL#5962271" }, { "@score":"1", "@id":"5962272", "info":{"authors":{"author":[{"@pid":"21/3246","text":"Konstantinos Moulinos"},{"@pid":"i/JohnIliadis","text":"John Iliadis"},{"@pid":"28/6866","text":"Vassilis Tsoumas"}]},"title":"Towards secure sealing of privacy policies.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"4","pages":"350-361","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/MoulinosIT04","doi":"10.1108/09685220410553569","ee":"https://doi.org/10.1108/09685220410553569","url":"https://dblp.org/rec/journals/imcs/MoulinosIT04"}, "url":"URL#5962272" }, { "@score":"1", "@id":"5962273", "info":{"authors":{"author":[{"@pid":"20/40","text":"Sonja Petrovic-Lazarevic"},{"@pid":"87/1901","text":"Amrik S. Sohal"}]},"title":"Nature of e-business ethical dilemmas.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"2","pages":"167-177","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Petrovic-LazarevicS04","doi":"10.1108/09685220410530807","ee":"https://doi.org/10.1108/09685220410530807","url":"https://dblp.org/rec/journals/imcs/Petrovic-LazarevicS04"}, "url":"URL#5962273" }, { "@score":"1", "@id":"5962274", "info":{"authors":{"author":[{"@pid":"27/443-1","text":"Sanjay Rawat 0001"},{"@pid":"78/556","text":"Ved Prakash Gulati"},{"@pid":"95/6184","text":"Arun K. Pujari"}]},"title":"Frequency- and ordering-based similarity measure for host-based intrusion detection.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"5","pages":"411-421","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/RawatGP04","doi":"10.1108/09685220410563397","ee":"https://doi.org/10.1108/09685220410563397","url":"https://dblp.org/rec/journals/imcs/RawatGP04"}, "url":"URL#5962274" }, { "@score":"1", "@id":"5962275", "info":{"authors":{"author":[{"@pid":"82/6308","text":"Muhammad A. Razi"},{"@pid":"84/1263","text":"J. Michael Tarn"},{"@pid":"70/7465","text":"Faisal A. Siddiqui"}]},"title":"Exploring the failure and success of DotComs.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"3","pages":"228-244","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/RaziTS04","doi":"10.1108/09685220410542598","ee":"https://doi.org/10.1108/09685220410542598","url":"https://dblp.org/rec/journals/imcs/RaziTS04"}, "url":"URL#5962275" }, { "@score":"1", "@id":"5962276", "info":{"authors":{"author":[{"@pid":"65/2426","text":"Sajjad ur Rehman"},{"@pid":"96/4454","text":"Laila Marouf"}]},"title":"Human resources for information management operations in Kuwaiti corporate companies.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"2","pages":"191-201","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/RehmanM04","doi":"10.1108/09685220410530825","ee":"https://doi.org/10.1108/09685220410530825","url":"https://dblp.org/rec/journals/imcs/RehmanM04"}, "url":"URL#5962276" }, { "@score":"1", "@id":"5962277", "info":{"authors":{"author":[{"@pid":"52/6073","text":"William T. Rupp"},{"@pid":"02/2059","text":"Alan D. Smith"}]},"title":"Exploring the impacts of P2P networks on the entertainment industry.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"102-116","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/RuppS04","doi":"10.1108/09685220410518865","ee":"https://doi.org/10.1108/09685220410518865","url":"https://dblp.org/rec/journals/imcs/RuppS04"}, "url":"URL#5962277" }, { "@score":"1", "@id":"5962278", "info":{"authors":{"author":[{"@pid":"18/8813","text":"Adesina S. Sodiya"},{"@pid":"99/3809","text":"H. O. D. Longe"},{"@pid":"60/4846","text":"Adio T. Akinwale"}]},"title":"A new two-tiered strategy to intrusion detection.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"27-44","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/SodiyaLA04","doi":"10.1108/09685220410518810","ee":"https://doi.org/10.1108/09685220410518810","url":"https://dblp.org/rec/journals/imcs/SodiyaLA04"}, "url":"URL#5962278" }, { "@score":"1", "@id":"5962279", "info":{"authors":{"author":{"@pid":"06/6098-2","text":"S. Srinivasan 0002"}},"title":"Role of trust in e-business success.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"66-72","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Srinivasan04","doi":"10.1108/09685220410518838","ee":"https://doi.org/10.1108/09685220410518838","url":"https://dblp.org/rec/journals/imcs/Srinivasan04"}, "url":"URL#5962279" }, { "@score":"1", "@id":"5962280", "info":{"authors":{"author":[{"@pid":"28/6866","text":"Vassilis Tsoumas"},{"@pid":"03/4038","text":"Theodore Tryfonas"}]},"title":"From risk analysis to effective security management: towards an automated approach.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"91-101","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/TsoumasT04","doi":"10.1108/09685220410518856","ee":"https://doi.org/10.1108/09685220410518856","url":"https://dblp.org/rec/journals/imcs/TsoumasT04"}, "url":"URL#5962280" }, { "@score":"1", "@id":"5962281", "info":{"authors":{"author":[{"@pid":"41/10150","text":"Xing-fen Wang"},{"@pid":"52/6049","text":"Yi-jun Li"}]},"title":"Formal definition and implementation of business-oriented SoD access control policy.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"5","pages":"379-388","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/Xing-fenY04","doi":"10.1108/09685220410563351","ee":"https://doi.org/10.1108/09685220410563351","url":"https://dblp.org/rec/journals/imcs/Xing-fenY04"}, "url":"URL#5962281" }, { "@score":"1", "@id":"5962282", "info":{"authors":{"author":[{"@pid":"42/653","text":"Ning Zhao"},{"@pid":"03/4461","text":"David C. Yen"},{"@pid":"33/4935","text":"I-Chiu Chang"}]},"title":"Auditing in the e-commerce era.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"5","pages":"389-400","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/ZhaoYC04","doi":"10.1108/09685220410563360","ee":"https://doi.org/10.1108/09685220410563360","url":"https://dblp.org/rec/journals/imcs/ZhaoYC04"}, "url":"URL#5962282" }, { "@score":"1", "@id":"5962283", "info":{"authors":{"author":[{"@pid":"65/6518","text":"Vasilios Zorkadis"},{"@pid":"54/1927","text":"P. Donos"}]},"title":"On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements.","venue":"Inf. Manag. Comput. Secur.","volume":"12","number":"1","pages":"125-137","year":"2004","type":"Journal Articles","access":"closed","key":"journals/imcs/ZorkadisD04","doi":"10.1108/09685220410518883","ee":"https://doi.org/10.1108/09685220410518883","url":"https://dblp.org/rec/journals/imcs/ZorkadisD04"}, "url":"URL#5962283" } ] } } } )