Information Management & Computer Security: Volume 16 Issue 2

Subjects:

Table of contents

The effect of organizational and individual characteristics on corporate intranet utilizations

Mohamad Noorman Masrek, Nor Shahriza Abdul Karim, Ramlah Hussein

This paper has the purpose of investigating the effect of organizational and individual characteristics on corporate intranet utilizations measured in terms of utilization modes…

2746

Interpretive structural modeling (ISM) of IT‐enablers for Indian manufacturing SMEs

Jitesh Thakkar, Arun Kanda, S.G. Deshmukh

This paper aims to investigate the issue of information technology (IT) adoption and implementation in Indian manufacturing small‐ and medium‐scale enterprise (SMEs) towards…

3497

An exploratory study on systems development methodologies for web‐based applications

Mohamad Noorman Masrek, Norhayati Hussin, Norashimawati Tarmuchi

The purpose of the paper is to investigate the status of systems development methodologies (SDM) usage for developing web‐based application in Malaysian organizations. In…

1619

Ontologies for information security management and governance

Edson dos Santos Moreira, Luciana Andréia Fondazzi Martimiano, Antonio José dos Santos Brandão, Mauro César Bernardes

This paper aims to show the difficulties involved in dealing with the quantity, diversity and the lack of semantics security information. It seeks to propose the use of ontologies…

3045

Supporting decision making in risk management through an evidence‐based information systems project risk checklist

Lihong Zhou, Ana Vasconcelos, Miguel Nunes

This paper aims to present a study of Information Systems project risk management aimed at identifying a risk ontology and checklist that will enable decision making and…

5577

Management versus security specialists: an empirical study on security related perceptions

H. Mouratidis, H. Jahankhani, M.Z. Nkhoma

The purpose of this study is to explore the rationale that governs implementation of information systems and network security expenditures through a case study approach.

1592
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid