Information Management & Computer Security: Volume 10 Issue 2

Subjects:

Table of contents

A holistic model of computer abuse within organizations

Jintae Lee, Younghwa Lee

Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in…

3618

Application service providers (ASP): moving downstream to enhance competitive advantage

Alan D. Smith, William T. Rupp

The application service provider (ASP) industry is a fairly young entry into the IT and automatic identification and data capture industries. There are various types of ASPs: EASP…

4420

Auditing disclosure risks of on‐line broker‐dealers

Huong Ngo Higgins

This paper discusses disclosures required of on‐line broker‐dealers, and recommends various internal measures that on‐line broker‐dealers should take to comply with securities…

974

Protecting personal privacy on the Internet

S.E. Kruck, Danny Gottovi, Farideh Moghadami, Ralph Broom, Karen A. Forcht

The rapid advance of technology has permitted the creation of vast amounts of information, both on and off the Internet. The public is only just beginning to realize how this…

5496

Quality of service – technology and implementation

Someswar Kesh, Sridhar Nerur, Sam Ramanujan

This paper discusses various facets of quality of service (QOS), a technology that allows network managers to prioritize data to optimize bandwidth use and maintain data quality…

1727
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid