Information Management & Computer Security: Volume 12 Issue 2

Subjects:

Table of contents

How well are corporate ethics codes and policies applied in the trenches?: Key factors and conditions

Thomas J. von der Embse, Mayur S. Desai, Seema Desai

Assesses the extent to which organizational ethics codes, credos and policies are implemented by managers and supervisors in their work. Further identifies and assesses the…

3688

Cyberterrorism, computer crime, and reality

C. Bryan Foltz

The term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat…

7030

Nature of e‐business ethical dilemmas

Sonja Petrovic‐Lazarevic, Amrik S. Sohal

Electronic business is based on using computers and networks in all aspects of business. This new business concept is developing its own culture, which faces many ethical…

6002

A long‐term trial of alternative user authentication technologies

S.M. Furnell, I. Papadopoulos, P. Dowland

Modern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username/password combinations, in spite…

Human resources for information management operations in Kuwaiti corporate companies

Sajjad ur Rehman, Laila Marouf

Investigates organizational arrangements and employment policies and practices of 31 Kuwaiti corporate companies in five selected information management operations: information…

1492
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid