Information Management & Computer Security: Volume 11 Issue 2

Subjects:

Table of contents

Integrating fuzzy logic into decision suppport systems: current research and future prospects

Kostas Metaxiotis, John Psarras, Emanuel Samouilidis

Companies deal with many decision‐making processes whose impact on the global performance can be very strong. As a consequence, the role of the decision support systems (DSSs…

2433

Privacy management – a new era in the Australian business environment

Vidya Moghe

People all over the world are increasingly concerned about the privacy issues surrounding the personal information collected by the governments, private organizations and…

1596

How to choose an ASP: selection guidelines

Luisa Focacci, Robert J. Mockler, Marc E. Gartenfeld, Dorothy G. Dologite

The great promise of software‐as‐a‐service lies in its ability to deliver at a much lower cost and at much greater speed. In the future, software will be delivered in such a way…

987

Quantifying the financial impact of IT security breaches

Ashish Garg, Jeffrey Curtis, Hilary Halper

Internet security is a pervasive concern for all companies. However, developing the business case to support investments in IT security has been particularly challenging because…

7969

Security architectures for network clients

Victoria Skoularidou, Diomidis Spinellis

Enumerates and compares a number of security‐enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software…

2310

Exploring potential strategic impacts of XML‐related technologies

Alan D. Smith

Extensible Markup Language (XML) made its entry in the late 1990s, but will it deliver real strategic value to businesses? Applying Norman’s and Christensen’s technology s‐curve…

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid