Information Management & Computer Security: Volume 13 Issue 3

Subjects:

Table of contents

System survivability: a critical security problem

J. Redman, M. Warren, W. Hutchinson

This paper seeks to delve into the concept of determining the survivability of critical infrastructure in society, especially information‐based networks.

1072

Information systems security from a knowledge management perspective

Petros Belsis, Spyros Kokolakis, Evangelos Kiountouzis

Information systems security management is a knowledge‐intensive activity that currently depends heavily on the experience of security experts. However, the knowledge dimension of…

7213

Mitigating the mobile agent malicious host problem by using communication patterns

I. Stengel, K.P. Fischer, U. Bleimann, J. Stynes

This paper seeks to describe an approach to mitigate the unsoluble malicious host problem.

Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system

Ioannis Zafeiropoulos, Kostas Metaxiotis, Dimitris Askounis

This paper aims to deal with the development of a risk management application for the modelling, optimal adaptation and implementation of an ERP system.

4110

An improved two‐tiered strategy to intrusion detection

A.S. Sodiya, H.O.D. Longe

A work that combined strategies in designing anomaly‐based instruction detection system (IDS) was described in CSIDS. This new work seeks to improve on CSIDS.

649

Knowledge management for Chinese medicines: a conceptual model

Iat Long Alex Lai

In the twenty‐first century and under the knowledge economy, knowledge is regarded as an important asset for many organizations. In the area of Chinese medicines, be it a research…

3049
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid