Information Management & Computer Security: Volume 13 Issue 4

Subjects:

Table of contents

An XML‐based architecture for data integration in vulnerability assessments

Andrew Blyth, Paula Thomas

One of the problems facing systems administrators and security auditors is that a security test/audit can generate a vast quantity of information that needs to be stored, analysed…

Data mining as a technique for knowledge management in business process redesign

O. Folorunso, A.O. Ogunde

Business process redesign (BPR) is undertaken to achieve order‐of‐magnitude improvements over “old” forms of the organization. Practitioners in academia and the business world…

3889

Conceptualizing strategic issues in information technology outsourcing

Niranjan Pati, Mayur S. Desai

It is posited that information technology (IT) outsourcing unfolds a complex relationship that has the propensity to start with a bang and end in a whimper unless the strategic…

5195

Information systems security issues and decisions for small businesses: An empirical examination

Atul Gupta, Rex Hammond

The objective of this study is to gather information about information technology (IT) related security issues in small firms in both manufacturing and service.

9175

What ERP systems can tell us about Sarbanes‐Oxley

William Brown, Frank Nasuti

To provide background for senior and middle management in information technology organizations who may be in the implementation phase of compliance for Sarbanes‐Oxley (SOX). As…

5223

Dynamic content attacks on digital signatures

Adil Alsaid, Chris J. Mitchell

Aims to address some of the problems that arise when signing digital documents that contain dynamic content.

1006
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid