EQR Q2 2009, vol. 5, no. 2

Information Sharing, Business Risks, Privacy, Wireless Security


Table of Contents

A Letter from the Executive Director

A Word from the Editor

Infrastructure Protection and Information Sharing

    • Information Sharing Exchanges
    • FISHA: a Framework for Information Sharing and Alerting
    • Information Infrastructure Protection
    • Establishing a National CSIRT in South Africa

Strategy and Business Risks

    • The Finnish National NIS Strategy and Information Risk Management and Process Reliability
    • The Convergence of Risk
    • Countering Insider Threats
    • Flemish SMEs Leave their IT Security in the Hands of Badly Informed Manager


    • Revocable Privacy
    • Privacy in Cloud Computing

Security of Wireless Networks

    • Improving the Security of Wireless Communications
    • Can you be Traced by your Bluetooth Device?

Food for Thought

    • Rule-breakers – the Ones to Watch?
PDF document icon eqr2009Q2.pdf — PDF document, 2.05 MB (2154551 bytes)

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information