Table of contents
A Tool for Information Security Management
H. van de Haar, R. von SolmsTop management is responsible for the wellbeing of theorganization. Most organizations nowadays are dependent totally on theavailability and effectiveness of their information…
Computing Environment in an Arabian Gulf Country: An Organizational Perspective
Ugur Yavas, Mahmoud YasinExamines the computing environment in Saudi Arabia. Studiestrichotomy of Saudi organizations. After profiling these organizations,investigating reasons behind their…
Security Officers′ Attitudes to the Use of Shared Logons
Dieter Fink, Daniel C. DuffyUser identifiers/passwords are an integral part of the first lineof defence of a computer system. Ideally, each user should have a uniquelogon assigned to him or her but because…
Neural Networks and Expert Systems: New Horizons in Business Finance Applications
Mohammed H. A. Tafti, Ehsan NikbakhtNeural networks and expert systems are two major branches ofartificial intelligence (AI). Their emergence has created the potentialfor a new generation of computer‐based…
STAR and Economic Regeneration: Some Feedback from Northern Ireland
William J. Martin, Michael ArmstrongReports recent work on the impact of the European STAR programme onthe process of economic regeneration in Northern Ireland. Seeks to drawlessons from the Northern Ireland…