I would be interested in corresponding with a student in this area, as a manager of information security in a corporate environment it's often quite differnet from academic theory when one establishes protection programs... Regards... Bill Boni