Information Management & Computer Security: Volume 10 Issue 3

Subjects:

Table of contents

An experimental comparison of secret‐based user authentication technologies

I. Irakleous, S.M. Furnell, P.S. Dowland, M. Papadaki

The paper presents a comparative study of software‐based user authentication techniques, contrasting the use of traditional password and personal identifier numbers (PIN) against…

Information management of automatic data capture: an overview of technical developments

Alan D. Smith, Felix Offodile

Automatic identification and data capture/collection (AIDC) systems are one of the most widely used and under‐recognized IT strategic assets in use in the global economy. Data…

3540

The information security management toolbox – taking the pain out of security management

Clive Vermeulen, Rossouw Von Solms

Because of changes that have taken place in the way that IT is used in organisations, as well as the purposes for which it is used, traditional forms of computer security are no…

3428

Identifying risks during information system development: managing the process

Stuart Maguire

Developments in information and communications technology have allowed many organisations to implement systems that directly link to customers and suppliers. In a number of…

6685

System insecurity – firewalls

Mayur S. Desai, Thomas C. Richards, Thomas von der Embse

The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from…

3125
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid