Information Management & Computer Security: Volume 14 Issue 3

Subjects:

Table of contents

Formulating information systems risk management strategies through cultural theory

Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos Kiountouzis

The purpose of this paper is to examine the potential of cultural theory as a tool for identifying patterns in the stakeholders' perception of risk and its effect on information…

5633

Issue report on business adoption of Microsoft Passport

Kim‐Kwang Raymond Choo

The purpose of this paper is to examine the feasibility and desirability of using the Microsoft Passport service for client authentication and authorization. It aims to present…

1094

Achieving automated intrusion response: a prototype implementation

M. Papadaki, S.M. Furnell

The increasing speed and volume of attacks against networked systems highlights the need to automate the intrusion response process. This paper proposes a means by which such…

Home page usability and credibility: A comparison of the fastest growing companies to the Fortune 30 and the implications to IT governance

William Brown, Mezbahur Rahman, Travis Hacker

The purpose of the research was to compare web site designs used by the fastest growing companies in the USA to the largest companies in the USA and to benchmark those designs…

1631

Trust, privacy, and security in electronic business: the case of the GCC countries

Zeinab Karake Shalhoub

The lack of trust in online transactions is one of the main reasons for the relatively low electronic commerce adoption, especially in developing and emerging economies such as…

5636

Duty of care involving outsourced payroll

Richard Mou, Brian Kleiner

To review the issues surrounding the outsourcing of payroll.

2075
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid