Information Management & Computer Security: Volume 10 Issue 1

Subjects:

Table of contents

The utilization of trend analysis in the effective monitoring of information security. Part 2: the model

Martin Botha, Rossouw von Solms

A survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all face a…

1086

Biometric authentication: assuring access to information

Austin Jay Harris, David C. Yen

In this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how…

3103

Using business models and revenue streams for digital marketplace success

Mark Lunn

Over the last 18 months digital market places have gone through a difficult period of change, consolidation and closure. They have suffered from meagre transaction volumes and…

3990

Evaluation and selection of an antivirus and content filtering software

Farrokh Mamaghani

Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of the Internet computer viruses. Given the rise in micro…

2583

The impact of next generation XML

Billy B.L. Lim, H. Joseph Wen

Over the past few years, business‐to‐business (B2B) e‐commerce has grown exponentially. To conduct B2B e‐commerce, companies need a common language. HTML is not suited for this…

1384

IT in manufacturing for performance: the challenge for Thai manufacturers

Ranjan B. Kini

Earlier research showed through an empirical study of 60 US manufacturing companies that manufacturing proactiveness especially through investments in structural programs coupled…

930
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid