Information Management & Computer Security: Volume 18 Issue 3

Subjects:

Table of contents

A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems

Ahmed Patel, Wei Qi, Christopher Wills

There is a need to provide secure and safe information security systems through the use of firewalls, intrusion detection and prevention systems, encryption, authentication, and…

2220

Brand, knowledge, and false sense of security

Wendy Hui

The purpose of this paper is to study how brand name can affect consumers' perceived protection from security technologies. It also seeks to investigate the significance of…

1843

Justifying the need for a data security management plan for the UAE

K. Al‐Awadi, M. Saidani

As the United Arab Emirates (UAE) organizations are embarking onto the intensive technology world where the exchange of information is increasingly taking place through electronic…

1651

Finding middle ground management strategy for software development

Zvi Goldstein, David Petrie, Yosef Sherif

The purpose of this paper is to advance a dynamic programming model that encompasses critical attributes of plan‐driven development, rapid development, agile development, and the…

1248
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid