Information Management & Computer Security: Volume 13 Issue 5

Subjects:

Table of contents

BI and ERP integration

David C. Chou, Hima Bindu Tripuramallu, Amy Y. Chou

This paper seeks to propose a business intelligence (BI) and enterprise resource planning (ERP) integrated framework that adds value to enterprise systems.

10946

Optimized multi‐party certified email protocols

Jianying Zhou, Jose Onieva, Javier Lopez

As a value‐added service to deliver important data over the internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a…

An integrated identity verification system for mobile terminals

Oleksiy Mazhelis, Jouni Markkula, Jari Veijalainen

To report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and…

1128

A good‐practice guidance on the use of PKI services in the public sector of the European Union member states

Stefanos Gritzalis

This paper aims to describe good‐practice guidance on how a secure and efficient public key infrastructure (PKI) can be developed to support secure and efficient…

Information systems outsourcing success factors: a review and some results

Reyes Gonzalez, Jose Gasco, Juan Llopis

This paper aims to offer the results of a survey about information systems (IS) outsourcing.

6219

Intelligent authentication, authorization, and administration (I3A)

Dan Eigeles

This paper has the purpose of presenting intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between…

1099
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid