Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 11, Number 5, 2003

Internet anonymity practices in computer crime
pp. 209-215(7)
Authors: Armstrong, H.L.; Forde, P.J.

Favourites:
ADD

Decision support through knowledge management: the role of the artificial intelligence
pp. 216-221(6)
Authors: Metaxiotis, Kostas; Ergazakis, Kostas; Samouilidis, Emannuel; Psarras, John

Favourites:
ADD

Intrusion detection: methods and systems. Part II
pp. 222-229(8)
Authors: Sherif, Joseph S; Ayers, Rod

Favourites:
ADD

Toward strategic use of IT in SMEs: a developing country perspective
pp. 230-237(8)
Authors: Temtime, Z.T.; Chinyoka, S.V.; Shunda, J.P.W.

Favourites:
ADD

A security risk management approach for e-commerce
pp. 238-242(5)
Authors: Warren, M; Hutchinson, W

Favourites:
ADD

An integrated system theory of information security management
pp. 243-248(6)
Authors: Hong, Kwo-Shing; Chi, Yen-Ping; Chao, Louis R; Tang, Jih-Hsing

Favourites:
ADD
Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content