Information Management & Computer Security: Volume 11 Issue 5

Subjects:

Table of contents

Internet anonymity practices in computer crime

H.L. Armstrong, P.J. Forde

Money laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet…

8461

Decision support through knowledge management: the role of the artificial intelligence

Kostas Metaxiotis, Kostas Ergazakis, Emannuel Samouilidis, John Psarras

Knowledge management (KM) has recently received considerable attention in the computer information systems community and is continuously gaining interest by industry, enterprises…

4691

Intrusion detection: methods and systems. Part II

Joseph S. Sherif, Rod Ayers

This paper is part II of a previous article of the same title: Intrusion detection. Part II is concerned with intrusion threats, attacks, defense, models, methods and systems.

1416

Toward strategic use of IT in SMEs: a developing country perspective

Z.T. Temtime, S.V. Chinyoka, J.P.W. Shunda

This article analyzes the strategic use of microcomputers and software packages in corporate planning and decision making in SMEs. Data were collected from 44 SMEs from three…

2310

A security risk management approach for e‐commerce

M. Warren, W. Hutchinson

E‐commerce security is a complex issue; it is concerned with a number of security risks that can appear at either a technical level or organisational level. This paper uses a…

4138

An integrated system theory of information security management

Kwo‐Shing Hong, Yen‐Ping Chi, Louis R. Chao, Jih‐Hsing Tang

With the popularity of electronic commerce, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of…

18258

An XML‐based administration method on role‐based access control in the enterprise environment

Cungang Yang, Chang N. Zhang

Proposes an object‐oriented role‐based access control (ORBAC) model to efficiently represent the real world. Though ORBAC is a good model, administration of ORBAC, including…

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid