Information Management & Computer Security: Volume 12 Issue 1

Subjects:

Table of contents

Embedding privacy in IT applications development

Dimitris A. Gritzalis

A considerable research stream in information systems security has elaborated several propositions as to how privacy and anonymity can be protected, the most prominent of which…

4808

A new two‐tiered strategy to intrusion detection

A.S. Sodiya, H.O.D. Longe, A.T. Akinwale

Researchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work is to combine…

1066

D‐TIFIS: a decision support system for options trading

K. Maris, K. Metaxiotis, G. Pantou, K. Nikolopoulos, E. Tavanidou, V. Assimakopoulos

Some analysts have claimed that the volatility of an asset is caused solely by the random arrival of new information about the future returns from the asset. Others have claimed…

1298

Role of trust in e‐business success

S. Srinivasan

Success of an e‐business rests on many factors. One of the important contributors is trust. Trust is something that an e‐business must strive to achieve over a period of time…

8024

Adopting e‐commerce Web site operation modes: The current state of large US firms

Jau‐Yang Liu, J. Michael Tarn, H. Joseph Wen

This paper applies an analytical framework to assess e‐commerce (EC) Web sites of large US firms. It first examines the available EC operation modes and then discusses the EC…

1863

From risk analysis to effective security management: towards an automated approach

Vassilis Tsoumas, Theodore Tryfonas

Effective and risk‐free operation of modern information systems relies heavily on security practices and overall information security management. Usually, organizations perform…

2395

Exploring the impacts of P2P networks on the entertainment industry

William T. Rupp, Alan D. Smith

Any solution that will solve the problem the entertainment industry is currently facing will need to address the underlying theme in the decline of self‐policing and morally…

5553

A data mining approach to neural network training

Moncef Belhadjali, Gary L. Whaley

Neural networks are widely used in model building. Applications include predicting bankruptcy, and assessing the relationship quality between a customer and a salesperson. This…

1586

On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements

V. Zorkadis, P. Donos

Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…

3057
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid