Information Management & Computer Security: Volume 5 Issue 3

Subjects:

Table of contents

Commercialization of cryptography

Carrie Liddy

Presents the major approaches for achieving commercial security on the Internet, public key and key escrow. Discusses the implications of (US) legislation putting limitations on…

572

The death of ROI: re‐thinking IT value measurement

Thornton A. May

Presents the case that traditional return on investment (ROI) as an approach for justifying and measuring the value of IT investments is no longer appropriate. Argues that…

1132

Managing information resources and environmental turbulence

Zeinab A. Karake

Using a sample of large industrial firms from two industries with differing external turbulence ‐ commercial banking and pharmaceutical ‐ hypothesizes that the need for a senior…

1823

Securely handling staff terminations

Charles Cresson Wood

Discusses risks to organizational computer security following staff termination and provides anecdotal evidence of what can go wrong. Suggests a policy for dealing with computer…

534

Improving security in computational electronic mail systems

Schubert Foo, Peng Chor Leong, Yee Nam Sng

Posits that computational electronic mail is essentially traditional electronic mail messages with embedded programs or interpretable scripts. States, at the recipient’s end, the…

Government initiatives in information technology security

Steve Orlowski

Examines the balance between privacy and law enforcement and initiatives from central governments to retain control. Describes the computer security tools available and discusses…

1768
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid