Information Management & Computer Security: Volume 14 Issue 1

Subjects:

Table of contents

Intelligent authentication, authorization, and administration (I3A)

Dan Eigeles

Aims to present intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement…

1398

Information security: management's effect on culture and policy

Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer, F. Nelson Ford

This study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organization's security culture and level of…

8181

Earned value management in a data warehouse project

J. Art Gowan, Richard G. Mathieu, Mark B. Hey

Sets out to examine earned value management (EVM), a project management technique that relates resource planning to schedules, technical costs and schedule requirements.

6602

Competency based management: a review of systems and approaches

Fotis Draganidis, Gregoris Mentzas

Aims to review the key concepts of competency management (CM) and to propose method for developing competency method.

14963

Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures

Kevin Curran, Sheila McKinney

Seeks to demonstrate how, with regard to viewing video on the internet, the delay experienced, whilst the stream is being buffered, can be virtually eradicated.

A novel watermarking algorithm for resistant geometric attacks using feature points matching

Jin Cong

Aims to report a novel method of estimating the geometric manipulation to which present day data hiding is subjected.

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid