Information Management & Computer Security: Volume 7 Issue 4

Subjects:

Table of contents

New models for the management of public key infrastructure and root certification authorities

Stephen Wilson

Public key infrastructure (PKI) has been discussed for some time but has yet to command much attention from business or policy makers. The benefits of chaining certificate…

Managing and controlling computer misuse

Gurpreet Dhillon

This paper argues that many of the losses owing to computer‐related fraud could be avoided if organizations adopt a more pragmatic approach in dealing with such incidents. The…

5159

Internet‐based business opportunities: buyers beware of scams

Mohsen Attaran

The online consumer market is growing geometrically. Although online shopping offers convenience and saves time, it has its serious drawbacks as well. The Internet is a fabulous…

1856

Avoiding securities class actions arising from Y2K issues

Brian W. Smith, Andrew J. Morris

The threat of securities class actions haunts every public company. The threat probably is worst for information technology companies. Similarly, Y2K claims may threaten every…

Strategic business applications and new virtual knowledge‐based businesses through community‐based information networks

Mitsuru Kodama

This article will point out that fully utilizing community‐based information networks based on multimedia digital networking IT (information technology) supports managerial speed…

1460
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid