Information Management & Computer Security: Volume 6 Issue 3

Subjects:

Table of contents

The evolution of information technology

Ernest‐Jan Mutsaers, Han van der Zee, Henrik Giertz

The first version of the Nolan Stages Theory appeared in 1973. It explained the dynamics of the increasingly vital production factor called IT. This theory is probably the most…

6526

Strategic ignorance: the new competitive high ground

Thornton May

Assesses the realistic current state of the issues that the modern IT manager has to contend with. Concludes that the resource to be managed is not knowledge but its inverse…

357

The role of service level agreements in IT service delivery

Kent D. Larson

Introduces the concept of service level agreements (SLAs) in IT service provision, especially in the case of outsourced service provision. Reports the experience of several…

3396

Security pitfalls in cryptographic design

Bruce Schneier

Highlights the common security pitfalls in cryptographic design. States that even strong encryption algorithms can be circumvented by bypassing the algorithms altogether and…

944

Database gateway processor risk analysis using fuzzy logic

Donald R. Moscato

Many large organizations maintain a significant amount of their data in what are currently referred to as legacy systems. In order to provide end users access to the firm’s legacy…

511
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid