Information Management & Computer Security: Volume 20 Issue 2

Subjects:

Table of contents

Validation of a biases model in strategic security decision making

Michael Workman

Funding agencies such as the Office of Naval Research, Department of Homeland Security, and others, have reduced funding for non‐tactical operations. Simultaneously, organizations…

Resilience at interfaces: Improvement of safety and security in distributed control systems by web of influence

Stig Ole Johnsen

The purpose of this paper is to support the implementation of safety and security guidelines in the Norwegian oil and gas industry and verify the actual use of the guidelines by…

A conceptual framework for information technology governance effectiveness in private organizations

Norshidah Mohamed, Jasber Kaur a/p Gian Singh

The purpose of this paper is to develop a conceptual framework that examines information technology (IT) governance effectiveness, its determinants, and its impacts on private…

5538

Estimates of success rates of remote arbitrary code execution attacks

Teodor Sommestad, Hannes Holm, Mathias Ekstedt

The purpose of this paper is to identify the importance of the factors that influence the success rate of remote arbitrary code execution attacks. In other words, attacks which…

An evaluation of a secure and trustworthy mobile agent‐based e‐marketplace system

Ahmed Patel, Wei Qi, Mona Taghavi

Mobile agent‐based e‐marketplaces are business applications that have been developed as flexible and efficient approaches to help companies or corporations to extend their…

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid