@article {Grupe:1998:0968-5227:155, author = "Grupe, Fritz H and Hensley, James M and Yamamura, Jeanne H", title = "Watching systems in action: security at the periphery", journal = "Information Management & Computer Security", volume = "6", number = "4", year = "1998", itemtype = "article", issn = "0968-5227", publication date ="1998-04-01T00:00:00", pages = "155-159", url = "https://www.ingentaconnect.com/content/mcb/046/1998/00000006/00000004/art00001" parent_itemid = "infobike://mcb/046", publishercode ="mcb" } @article {Hurley:1998:0968-5227:160, author = "Hurley, Margaret A", title = "Features and functions overload", journal = "Information Management & Computer Security", volume = "6", number = "4", year = "1998", itemtype = "article", issn = "0968-5227", publication date ="1998-04-01T00:00:00", pages = "160-161", url = "https://www.ingentaconnect.com/content/mcb/046/1998/00000006/00000004/art00002" parent_itemid = "infobike://mcb/046", publishercode ="mcb" } @article {Ratnasingham:1998:0968-5227:162, author = "Ratnasingham, Pauline", title = "Trust in Web-based electronic commerce security", journal = "Information Management & Computer Security", volume = "6", number = "4", year = "1998", itemtype = "article", issn = "0968-5227", publication date ="1998-04-01T00:00:00", pages = "162-166", url = "https://www.ingentaconnect.com/content/mcb/046/1998/00000006/00000004/art00003" parent_itemid = "infobike://mcb/046", publishercode ="mcb" } @article {Thomson:1998:0968-5227:167, author = "Thomson, M.E. and von Solms, R", title = "Information security awareness: educating your users effectively", journal = "Information Management & Computer Security", volume = "6", number = "4", year = "1998", itemtype = "article", issn = "0968-5227", publication date ="1998-04-01T00:00:00", pages = "167-173", url = "https://www.ingentaconnect.com/content/mcb/046/1998/00000006/00000004/art00004" parent_itemid = "infobike://mcb/046", publishercode ="mcb" } @article {von Solms:1998:0968-5227:174, author = "von Solms, Rossouw", title = "Information security management (1): why information security is so important", journal = "Information Management & Computer Security", volume = "6", number = "4", year = "1998", itemtype = "article", issn = "0968-5227", publication date ="1998-04-01T00:00:00", pages = "174-177", url = "https://www.ingentaconnect.com/content/mcb/046/1998/00000006/00000004/art00005" parent_itemid = "infobike://mcb/046", publishercode ="mcb" } @article {Wen:1998:0968-5227:178, author = "Wen, H Joseph and Tarn, Jyh-Horng Michael", title = "Internet security: a case study of firewall selection", journal = "Information Management & Computer Security", volume = "6", number = "4", year = "1998", itemtype = "article", issn = "0968-5227", publication date ="1998-04-01T00:00:00", pages = "178-184", url = "https://www.ingentaconnect.com/content/mcb/046/1998/00000006/00000004/art00006" parent_itemid = "infobike://mcb/046", publishercode ="mcb" }