Information Management & Computer Security: Volume 9 Issue 5

Subjects:

Table of contents

Novel biometric digital signatures for Internet‐based applications

P.K. Janbandhu, M.Y. Siyal

Personal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce…

1971

Information technology outsourcing in Australia: a literature review

Christina Costa

The objective of this literature review is to provide a background and a synthesis of existing studies conducted on IT outsourcing. The IT outsourcing trend has become…

4888

Domain names management: a strategy for electronic commerce security

Mary A. Clark, David C. Chou, David C. Yen

A good Internet domain names management allows electronic commerce participants to enjoy a convenient domain name registration process. Domain name owners will gain a high…

1120

Security and trust management in supply chains

Ramesh Kolluru, Paul H. Meredith

The past decade in the area of supply chain management has been characterized by increased emphasis on collaboration between trading partners. The paradigm shift from competition…

2764

The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept

Martin Botha, Rossouw von Solms

A survey recently completed by the Computer Security Institute and the Federal Bureau of Investigation revealed that corporations, banks, and governments all face a growing threat…

1222

IT outsourcing – managing the key asset

Margaret Hurley

It is sometimes forgotten, in the day‐to‐day management of business, that the only real asset in most outsourcing arrangements is the collection of individuals who execute the…

2633
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid