Information Management & Computer Security: Volume 11 Issue 1

Subjects:

Table of contents

Deployment of anti‐virus software: a case study

Joseph S. Sherif, David P. Gilliam

The growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining…

1854

Application service providers: an application of the transaction cost model

Alan D. Smith, William T. Rupp

Application service providers (ASPs) are expected to become a $25 billion industry by 2004. A firm’s decision to build or buy its IT infrastructure is dependent upon an…

1665

E‐commerce policies and customer privacy

Mayur S. Desai, Thomas C. Richards, Kiran J. Desai

The rapid growth of the Internet and the number of online consumers have resulted in increased fears from privacy advocates, legislators and consumer groups regarding the…

5498

Information systems professionals and conflict of interest

Fritz Grupe

Conflicts of interest are situations in which a decision maker must balance personal interests with corporate or organizational interests. Often the conflict is unknown to others…

2796

Networks security measures using neuro‐fuzzy agents

Nasser S. Abouzakhar, Gordon A. Manson

The growing dependence of modern society on telecommunication and information networks and e‐type systems has become inevitable. However, those types of systems are vulnerable to…

Customer relationship management (CRM) in business‐to‐business (B2B) e‐commerce

Yun E. Zeng, H. Joseph Wen, David C. Yen

Customer relationship management (CRM) and business‐to‐business (B2B) are essential to the success of modern business. Although they are two different modules, they share many…

27356
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid