{"title":"A New Paradigm for Adding Security Into IS Development Methods","authors":"M. Siponen, R. Baskerville","doi":"10.1007/0-306-47007-1_8","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_8","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Method for Healthcare Organisations","authors":"M. Warren, W. Hutchinson","doi":"10.1007/0-306-47007-1_12","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_12","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115971306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques","authors":"Elmé Smith, J. Eloff","doi":"10.1007/0-306-47007-1_11","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_11","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II","authors":"E. Saul, A. Hutchison","doi":"10.1007/0-306-47007-1_6","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_6","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, P. Kanellis, D. Martakos
{"title":"A Model and Implementation Guidelines for Information Security Strategies in Web Environments","authors":"C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, P. Kanellis, D. Martakos","doi":"10.1007/0-306-47007-1_2","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_2","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122999864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interpreting Computer-Related Crime at the Malaria Research Center: A Case Study","authors":"G. Dhillon, Leiser Silva","doi":"10.1007/0-306-47007-1_13","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_13","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Documentation","authors":"Lam-for Kwok, Peggy P. K. Fung, D. Longley","doi":"10.1007/0-306-47007-1_10","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_10","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"432 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing Information Security Management Systems","authors":"F. Björck","doi":"10.1007/0-306-47007-1_15","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_15","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115208072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Three-Dimensional Framework for Security Implementation in Mobile Environments","authors":"Bethuel Roberto Vinaja","doi":"10.1007/0-306-47007-1_3","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_3","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133190123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Soft Systems Methodology to Facilitate the Development of a Computer Security Teaching Module","authors":"J. Biggam, A. Hogarth","doi":"10.1007/0-306-47007-1_9","DOIUrl":"https://doi.org/10.1007/0-306-47007-1_9","url":null,"abstract":"","PeriodicalId":302529,"journal":{"name":"Conference on Information Security Management & Small Systems Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133534039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}