Information Management & Computer Security: Volume 12 Issue 3

Subjects:

Table of contents

Incorporating WS‐Security into a Web services‐based portal

Billy B.L. Lim, Yan Sun, Joaquin Vila

Software reuse and systems interoperability have been the primary goals of many IT organizations as a means to curb software cost. While there were spots of success over the…

1079

RECOT: an expert system for the reduction of environmental cost in the textile industry

Kostas Metaxiotis

Environmental legislation and its enforcement has undoubtedly forced the textile industry to be rather cautious in selecting the appropriate processes and equipment. The most…

1559

Exploring the failure and success of DotComs

Muhammad A. Razi, J. Michael Tarn, Faisal A. Siddiqui

The Internet added another dimension to traditional commerce when online business became available. Because of the mushroom growth of online businesses in the late 1990s, DotCom…

7087

An exploration of wireless computing risks: Development of a risk taxonomy

Bouchaib Bahli, Younes Benslimane

Wireless computing, as a way of providing mobile services, has been growing steadily during the past few years. While wireless communications offer organizations and users many…

3514

Enhancing Web privacy and anonymity in the digital era

Stefanos Gritzalis

This paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture…

3066

Genetic algorithms: A business perspective

Fritz H. Grupe, Simon Jooste

Describes one of the newest forms of artificial intelligence being applied to the solution of business problems – the genetic algorithm (GA). GAs are useful when a problem has…

1980
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid