Information Management & Computer Security: Volume 15 Issue 1

Subjects:

Table of contents

The selection of instant messaging or e‐mail: College students' perspective for computer communication

Sean Lancaster, David C. Yen, Albert H. Huang, Shin‐Yuan Hung

Instant messaging and e‐mail are popular communication methods on college campuses. However, students' perceptions of the two technologies vary greatly. This study seeks to…

3175

Image edge detection: A knowledge management technique for visual scene analysis

O. Folorunso, O.R. Vincent, B.M. Dansu

This paper seeks to describe the use of edge‐detection as an approach to support the process of analyzing visual scenes.

1141

Solvable problems in enterprise digital rights management

E. John Sebes, Mark Stamp

Digital rights management (DRM) is often promoted as the technical basis for solutions to enterprise security problems requiring persistent protection. Yet to date, DRM has failed…

1150

Evaluating the security controls of CAIS in developing countries: An examination of current research

Ahmad A. Abu‐Musa

The main objective of the paper is to investigate the existence and adequacy of implemented Computerized Accounting Information Systems (CAIS) security controls to prevent, detect…

1975

A strategic modeling technique for information security risk assessment

Subhas C. Misra, Vinod Kumar, Uma Kumar

This paper seeks to present a conceptual modeling approach, which is new in the domain of information systems security risk assessment.

3788
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid