Information Management & Computer Security: Volume 1 Issue 1

Subjects:

Table of contents

A Tool for Information Security Management

H. van de Haar, R. von Solms

Top management is responsible for the wellbeing of theorganization. Most organizations nowadays are dependent totally on theavailability and effectiveness of their information…

1547

Computing Environment in an Arabian Gulf Country: An Organizational Perspective

Ugur Yavas, Mahmoud Yasin

Examines the computing environment in Saudi Arabia. Studiestrichotomy of Saudi organizations. After profiling these organizations,investigating reasons behind their…

Security Officers′ Attitudes to the Use of Shared Logons

Dieter Fink, Daniel C. Duffy

User identifiers/passwords are an integral part of the first lineof defence of a computer system. Ideally, each user should have a uniquelogon assigned to him or her but because…

Neural Networks and Expert Systems: New Horizons in Business Finance Applications

Mohammed H. A. Tafti, Ehsan Nikbakht

Neural networks and expert systems are two major branches ofartificial intelligence (AI). Their emergence has created the potentialfor a new generation of computer‐based…

STAR and Economic Regeneration: Some Feedback from Northern Ireland

William J. Martin, Michael Armstrong

Reports recent work on the impact of the European STAR programme onthe process of economic regeneration in Northern Ireland. Seeks to drawlessons from the Northern Ireland…

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid