Information Management & Computer Security: Volume 10 Issue 5

Subjects:

Table of contents

An intelligent approach to prevent distributed systems attacks

Nasser S. Abouzakhar, Gordon A. Manson

In today’s society, information and communications technology (ICT) is the force that drives prosperity and provides a higher standard of living. All other e‐services and…

1753

Towards maturity of information security maturity criteria: six lessons learned from software maturity criteria

Mikko Siponen

Traditionally, information security management standards listing generic means of protection have received a lot of attention in the field of information security management. In…

2297

Information flow analysis on role‐based access control model

Chang N. Zhang, Cungang Yang

Information flow analysis is a necessary step to determine the information security for a given system. In this paper, we introduce an object oriented role‐based access control…

1299

Security of personal data across national borders

Elizabeth Tran, MaryAnne Atkinson

Rapid technological advancements present many opportunities in the way people work, communicate and conduct business. That growth is especially prevalent in the World Wide Web. In…

3109

Integrating search engines with data mining for customer‐oriented information search

Tim France, Dave Yen, Jyun‐Cheng Wang, Chia‐Ming Chang

In recent years, the World Wide Web (WWW) has become incredibly popular in homes and offices alike. Consumers need to search for relevant information to help solve purchasing…

5333

The importance of technology trust in Web services security

Pauline Ratnasingam

The Internet is changing the way businesses operate today. Firms are using the Web for procurement, to find trading partners, and to link existing applications to other…

4715
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid