Information Management & Computer Security: Volume 13 Issue 2

Subjects:

Table of contents

The biometric technologies business case: a systematic approach

Richard A. Riley, Virginia Franke Kleist

This paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric…

3139

An empirical study of the effect of perceived risk upon intention to use online applications

Hsi‐Peng Lu, Chin‐Lung Hsu, Hsiu‐Ying Hsu

The Technology Acceptance Model (TAM ) has been used to interpret people's adoptions of several kinds of technology. However, while people accept online application service…

7535

E‐enterprise security management life cycle

Stephen C. Shih, H. Joseph Wen

One of the purposes of this paper is to discuss special security concerns and new challenges at front‐end e‐business and back‐end supply chain operations. An e‐enterprise security…

3783

Information technology project failures: Applying the bandit problem to evaluate managerial decision making

Dmitriy V. Chulkov, Mayur S. Desai

This paper seeks to apply results from the study of bandit processes to cases of information technology (IT) project failures.

6137

A conceptual model for enterprise resource planning (ERP)

Carl Marnewick, Lessing Labuschagne

This article seeks to provide a conceptual model that explains the complexity of an enterprise resource planning (ERP) system to general and project managers in a non‐technical…

12576

An automated framework for managing security vulnerabilities

A. Al‐Ayed, S.M. Furnell, D. Zhao, P.S. Dowland

This paper aims to look at unpatched software which represents a significant problem for internet‐based systems, with a myriad malware incidents and hacker exploits taking…

1546

Development of a qualitative reasoning model for financial forecasting

Someswar Kesh, M.K. Raja

To develop a model for financial forecasting using the principles of qualitative reasoning.

1896
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid