POS Security - State of Art in Finland (L. Arnkil, E. Einola). Portfolio Techniques to Support Risk Management and Security (K. Bauknecht, C. Strauss). Security - A Personnel Issue: The Importance of Personnel Attitudes and Security Education (J.G. Beatson). EDP Safety and Usage (I. Bentzien). A Knowedge Based Method of Managing Risks in Dynamic Environments (D. Bonyun, G. Jones). Risk Analysis of "Trusted Computer Systems" (K. Brunnstein, S. Fischer-Hubner). A Relational DBMS Security Policy (R.K. Burns). CRYPTEL: The Practical Protection of an Existing Electronic Mail System (H. Cnudde). Planning as a Means to Achieve Appropriate Data Communications Security (C. Cresson Wood). The Concept of Secure Information Processing Systems and Their Basic Functions (R. Dierstein). A Methodology for Analysing Human and Computer-Related Issues in Secure Systems (J. Dobson). Asymmetric Authentication Schemes for Smart Cards - Dream or Reality? (W. Fumy, A. Pfau). Contingency Planning - Managing the External Impacts of System Security Failures (R. Hackworth). Computer Viruses: Factors to Consider Before Purchasing an Anti-Virus Product (H.J. Highland). The Digital Distributed System Security Architecture (D.B. Holden). Computer Ethics and Computer Abuse: A Longitudinal Study of Swedish University Students (S. Kowalski). Managing the Virus Risk (M.P.J. Kratz, P.J. Johnston). Information Systems Auditing - A Support to Management (K.E. Kristiansen). Planning for Disaster Recovery in a Multi-Vendor, Networked Computing Environment (K.H. Krueger). Technical Criteria for Security Evaluation of IT Products (Y. Le Roux). Proactive Network Risk Management (J. Lobel). Data Privacy: Legislation and Intelligence Agency Threats (W. Madsen). Separation of Duties Audit Concerns and the Clark-Wilson Data Integrity Model (R.R. Moeller). Security in ODP Systems (S. Muftic). Auditing the SNA/SNI Environment (R. Paans, H. de Lange). Seventeen Information Security Myths Debunked (D.B. Parker). Modelling Security in Distributed Systems (H.P. Riess). Corporate Information Security Policy (B. Sarton, P. Capiteijns). Computer Assisted Investigation of Computer Crime (P.M. Stanley). Trouble Ahead: Information Crime and Jurisdiction (M. Tantam). Case Tools and Security: A Solution or a Problem? (L.T. Taylor).