Information Management & Computer Security: Volume 15 Issue 4

Subjects:

Table of contents

An analysis of mobile credit card usage intentions

Hanudin Amin

Many banks consider mobile‐based technologies have improved the banking services through introduction of new banking facilities. One of the latest facilities developed in this…

6979

An empirical study of ERP success evaluations by business and IT managers

Princely Ifinedo

The purpose of this study is to examine how two organizational members, i.e. business and information technology (IT) managers evaluate the success measures of acquired enterprise…

2437

A STOPE model for the investigation of compliance with ISO 17799‐2005

Mohamed Saad Saleh, Abdullah Alrabiah, Saad Haj Bakry

With the widespread of e‐services, provided by different organizations at the internal intranet level, the business extranet level, and the public internet level, compliance with…

1013

A PRoactive malware identification system based on the computer hygiene principles

Vasileios Vlachos, Diomidis Spinellis

To present a new technique that contains the spread of rapid malcode, which is based on peer‐to‐peer (P2P) communication and the principles of computer hygiene.

Personalized biometric key using fingerprint biometrics

Ong Thian Song, Andrew Teoh Beng Jin, Tee Connie

This paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.

2015
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid