


default search action
Information Systems Security, Volume 16
Volume 16, Number 1, 2007
- John Campbell, Dale Kleeman, Wanli Ma:

The Good and Not So Good of Enforcing Password Composition Rules. 2-8 - Luther Martin:

Identity-based Encryption: From Identity and Access Management to Enterprise Privacy Management. 9-14 - Jon Callas:

The Future of Cryptography. 15-22 - Sean Steele, Chris Wargo:

An Introduction to Insider Threat Management. 23-33 - Stilianos Vidalis, Zafar Kazmi:

Security Through Deception. 34-41 - Costa Constantakis:

Securing Access in Network Operations - Emerging Tools for Simplifying a Carrier's Network Security Administration. 42-46 - Alex Malin:

Designing Networks that Enforce Information Security Policies. 47-53 - Ross Ortega:

Defending the Corporate Crown Jewels from the Dangers that Lurk Within - Effective Internal Network Security Focuses on Behavior. 54-60 - Edward H. Freeman:

RFIDs and Personal Privacy. 61-64 - Ken Dunham:

Pump and Dump Scams. 65-71
Volume 16, Number 2, 2007
- Andrea Klein:

Building an Identity Management Infrastructure for Today...and Tomorrow. 74-79 - William A. Yarberry Jr.:

Effective Change Management: Ensuring Alignment of IT and Business Functions. 80-89 - Ed Ginty:

Secure Data-Archiving: How to Protect and Store Your Data. 90-92 - Vyaghreswara Rao Namuduri, S. N. Narahari Pandit:

Multimedia Digital Rights Protection Using Watermarking Techniques. 93-99 - R. Kelly Rainer Jr., Thomas E. Marshall, Kenneth J. Knapp, Gina H. Montgomery:

Do Information Security Professionals and Business Managers View Information Security Issues Differently? 100-108 - Sam Fleming:

Implicit Trust Can Lead to Data Loss. 109-113 - Richard P. Tracy:

IT Security Management and Business Process Automation: Challenges, Approaches, and Rewards. 114-122 - Ken Dunham:

OrderGun.A: A Sophisticated Rootkit. 123-126 - Edward H. Freeman:

Vulnerability Disclosure: The Strange Case of Bret McDanel. 127-131
Volume 16, Number 3, 2007
- Kevin Curran

, Paul Canning:
Wireless Handheld Devices Become Trusted Network Devices. 134-146 - Steven Schlarman:

Selecting an IT Control Framework. 147-151 - Wei She, Bhavani Thuraisingham:

Security for Enterprise Resource Planning Systems. 152-163 - Lynn Erla Beegle:

Rootkits and Their Effects on Information Security. 164-176 - Bill Reed:

Implementing Information Lifecycle Security (ILS). 177-181 - Edward H. Freeman:

Email Privacy and the Wiretap Act: U.S. v. Councilman. 182-185
Volume 16, Number 4, 2007
- Ryan Sherstobitoff, Pedro Bustamante:

You Installed Internet Security on Your Network: Is Your Company Safe? 188-194 - Xin (Robert) Luo, Qinyu Liao:

Awareness Education as the Key to Ransomware Prevention. 195-202 - Richard E. Smith:

Trends in Security Product Evaluations. 203-216 - Rajni Goel:

Managing RFID Consumer Privacy and Implementation Barriers. 217-223 - Steven Schlarman:

The IT Compliance Equation: Understanding the Elements. 224-232 - Ken Dunham, Gold Honors:

Mitigating Malicious Code. 233-238 - Edward H. Freeman:

Computer Hackers and Search and Seizure: United States v. Jarrett. 239-243
Volume 16, Number 5, 2007
- Avinash W. Kadam:

Information Security Policy Development and Implementation. 246-256 - Todd Fitzgerald:

Clarifying the Roles of Information Security: 13 Questions the CEO, CIO, and CISO Must Ask Each Other. 257-263 - Sherali Zeadally, Nicolas Sklavos

, Moganakrishnan Rathakrishnan, Scott Fowler
:
End-to-End Security Across Wired-Wireless Networks for Mobile Users. 264-277 - Chris Nowell:

Regulatory Compliance - the Wonderful World of FISMA. 278-280 - Sujan Maskey, Brittany Jansen, Dennis C. Guster, Charles Hall:

A Basic Firewall Configuration Strategy for the Protection of Development-related Computer Networks and Subnetworks. 281-290 - Edward H. Freeman:

Holistic Information Security: ISO 27001 and Due Care. 291-294 - Ken Dunham:

Reducing Remote Risks within the Enterprise. 295-299
Volume 16, Number 6, 2007
- Peter O. Okenyi, Thomas J. Owens

:
On the Anatomy of Human Hacking. 302-314 - Michael Workman:

Gaining Access with Social Engineering: An Empirical Study of the Threat. 315-331 - Manpreet Singh, Manjeet Singh Patterh:

Security Functional Components for Building a Secure Network Computing Environment. 332-343 - Guillermo A. Francia III

, Rahjima R. Francia:
An Empirical Study on the Performance of Java/.Net Cryptographic APIs. 344-354 - Harold J. "Rockie" Grimes:

Security Sickness in the Health Networks. 355-356 - Edward H. Freeman:

Regulatory Compliance and the Chief Compliance Officer. 357-361

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














