Information Management & Computer Security: Volume 20 Issue 5

Subjects:

Table of contents

Information security and business continuity management in interorganizational IT relationships

Jonna Järveläinen

This paper aims to understand how managers of IT and information security aim to enhance information security and business continuity management in interorganizational IT…

4768

The effect of acquisition decision making on security posture

Eric H. Goldman

The purpose of this paper is to examine the effectiveness of decision making in IT acquisition and security, and the disparity between the two domains. The paper postulates that…

880

An investigation of students' perception of Bluetooth security

Margaret Tan, Kathrine Sagala Aguilar

Various research investigations have found that students' awareness of information security issues continues to be poor and this is indeed a concern especially when students use…

2023

Phishing counter measures and their effectiveness – literature review

Swapan Purkait

Phishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and…

6004
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid