Information Management & Computer Security: Volume 11 Issue 4

Subjects:

Table of contents

Keystroke dynamics on a mobile handset: a feasibility study

N.L. Clarke, S.M. Furnell, B.M. Lines, P.L. Reynolds

The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for…

1530

Implications of ICT for knowledge management in globalization

Jimmy J.M. Ng, K.X. Li

The purpose of this paper is to critically review the model of Hendriks and examine its suitability for the relationship of organizational knowledge management and information and…

7975

Intrusion detection: the art and the practice. Part I

Joseph S. Sherif, Rod Ayers, Tommy G. Dearmond

Organizations more often than not lack comprehensive security policies and are not adequately prepared to protect their systems against intrusions. This paper puts forward a…

1548

A novel approach to solve DSL network data rate problems

Raju Ramaswamy

Digital subscriber line (DSL) is a service that offers much faster Internet connection than a standard dial up connection. Crosstalk is a major impairment in DSL telecommunication…

Identifying security vulnerabilities through input flow tracing and analysis

Simeon Dimitriou Xenitellis

A software system can be considered as a collection of data and procedures that are separated from the environment and interact with it through channels of communication. If we…

764
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid