Information Management & Computer Security: Volume 15 Issue 2

Subjects:

Table of contents

Analyzing bloggers data on software design patterns and applications integration; methodology and implementation

Adil Fathelrahamn, Mathew Shafaghi

Blogs (a term that is short for weblogs) are one mean of getting public opinions about important topics. Several techniques could be used to reveal important views and directions…

730

Strategies for successful CRM implementation

ThuyUyen H. Nguyen, Joseph S. Sherif, Michael Newby

Customer relationship management (CRM) is an information system that tracks customers' interactions with the firm and allows employees to instantly pull up information about the…

33257

Analysis of security‐relevant semantics of BPEL in cross‐domain defined business processes

K.P. Fischer, U. Bleimann, W. Fuhrmann, S.M. Furnell

Aims to identify security‐relevant semantics of business processes being defined by WS‐BPEL (Web Services Business Process Execution Language, BPEL for short) scripts, in…

517

Evaluating the security controls of CAIS in developing countries: an empirical investigation

Ahmad A. Abu‐Musa

This paper aims to examine the existence and adequacy of implemented computerized accounting information system (CAIS) security controls to prevent, detect and correct security…

1122

A risk‐control framework for e‐marketplace participation: the findings of seven cases

Pauline Ratnasingam

E‐marketplaces have recently become a popular internet‐based e‐commerce application. Despite extensive research on this topic, there has been limited work in the realm of…

2177
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid