Conferences in DBLP
(aism) 2004 (conf/aism/2004)
Emiko Terado , Patricia A. H. Williams Securing PDAs in the Healthcare Environment. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:4-10 [Conf ] Paul Ashley Enforcement of a P3P Privacy Policy. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:11-26 [Conf ] Gim Hiong Soh , Timo Vuori New Form of Identity (ID) Theft Crime: Acquiring Personal Information from Your Online Newsletter Providers. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:27-36 [Conf ] C. C. Terence Tan Developing a framework for understanding Security Governance. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:37-48 [Conf ] Justin D. Pierce , Matthew J. Warren , David R. Mackay , Jason G. Wells Graphical Authentication: Justifications and Objectives. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:49-63 [Conf ] G. Murphy An Examination of the Security of Routing Protocol Updates. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:56-63 [Conf ] Malcolm R. Pattinson Risk Homeostasis as a Factor of Information Security. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:64-72 [Conf ] Vassilis Dimopoulos , Steven Furnell , Murray Jennex , Ioannis Kritharas Approaches to IT Security in Small and Medium Enterprises. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:73-82 [Conf ] Omar Zakaria Understanding Challenges of Information Security Culture: A Methodological Issue. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:83-93 [Conf ] Michael Wynne , Peter James Securing Data at Rest. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:94-103 [Conf ] A. Jancic , Matthew J. Warren PKI - Advantages and Obstacles. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:104-114 [Conf ] Christopher Bolan , Daniel Mende Computer Security Research: Approaches and Assumptions. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:115-124 [Conf ] Christopher Bolan Need to Know: Security or Liability? [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:125-128 [Conf ] Sabbir Ahmed , Leisa Armstrong Securing Web Services with XML aware Digital Signatures. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:129-134 [Conf ] Warren Brooks , Matthew J. Warren Health Information Security Evaluation: Continued Development of an Object-Oriented Method. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:135-150 [Conf ] Peter Wolski SOHO Wireless Intrusion Detection Systems - Cure or Placebo. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:151-158 [Conf ] Jill Slay , Gerald Quirchmayr A Formal Model for the Relationship between Culture and Trust within is Security Management. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:159-166 [Conf ] Mathew Hannan , Basil Tucker Risk Management and Organisational Culture: The Implications of Computer Network Attacks and Malware Incidents on Organizational Risk Management. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:167-177 [Conf ] Girish Bhagwan Gokhale , David A. Banks Organisational Information Security: A Viable System Perspective. [Citation Graph (0, 0)][DBLP ] AISM, 2004, pp:178-184 [Conf ]