Quantcast
Browsing all 40 articles
Browse latest View live

A Model and Guide for an Introductory Computer Security Forensics Course

View Article


Information Security: An Organizational Change Perspective

View Article


The Role of Exercises in Training the Nation's Cyber First-Responders

View Article

Empirical Test of Hacking Framework: An Exploratory Study

View Article

Do Concerns about Error in Data and Access to DataAffect Students' Feeling of...

View Article


Information Systems Security: A Model for VPN Performance Evaluation

View Article

The Trends in IS/IT Research for AMCIS Conferences: 1995 to 2004 (The Early...

View Article

Web Services and Web Services Security

View Article


Future Security Approaches and Biometrics

View Article


Preparing for Information Systems Program Accreditation

View Article

Geographic Information Systems

View Article

Intelligent Agents

View Article

Spyware: The Ghost in the Machine

View Article


Sarbanes-Oxley Links IT to Corporate Compliance

View Article

Research and Publication Opportunities at the Intersection of IS and Healthcare

View Article


Business Intelligence Software for the Classroom: MicroStrategy Web and...

View Article

Integrating Human-Computer Interaction Development into SDLC: A Methodology

View Article


Deconstructing the Text: the human/ machine paradox in technical documentation

View Article

Intelligent Agents and Information Resource Management

View Article

Application of the Petri Net to Simulate and Validate Complex, Multi-Vendor,...

View Article
Browsing all 40 articles
Browse latest View live