Information Management & Computer Security: Volume 8 Issue 5

Subjects:

Table of contents

Critical analysis of different approaches to minimizing user‐related faults in information systems security: implications for research and practice

Mikko T. Siponen

Even though the human component has been recognized to have a crucial role in information systems (IS) security, the human issues have not received much attention. Recently a few…

1767

“Need‐to‐know” principle and fuzzy security clearances modelling

Lech J. Janczewski, Victor Portougal

The paper discusses the assignment of security clearances to employees in a security conscious organisation. New approaches are suggested for solving two major problems. First…

1359

Security‐related concerns with geographic information systems and geographic mapping

Karen A. Forcht

Geographic information systems (GIS) makes use of geographic data, such as streets, store points, and block or neighborhood areas, and attribute data, such as population, income…

965

Disaster recovery planning: a strategy for data security

Steve M. Hawkins, David C. Yen, David C. Chou

The migration from centralized mainframe computers to distributed client/server systems has created a concern on data security. If a disaster occurs to the organization that…

7281

Towards a “business‐led” approach to information systems development

Stuart Maguire

There is growing concern about the apparent widespread failure of information systems (IS) and information technology (IT) to deliver real organisational and business benefits…

3652

Ethics and information technology use: a survey of US based SMEs

Sanjeev Phukan, Gurpreet Dhillon

The purpose of this paper is to study the beliefs and attitudes of small‐ and medium‐sized enterprises (SMEs) toward the ethical use of information technology (IT). This research…

2357

Issues with information dissemination on global networks

Michael Turega

There is a need today for active documents on a global network which can react to their environment. The documents should be able to deal with all issues of presentation…

585
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid