Information Management & Computer Security: Volume 16 Issue 3

Subjects:

Table of contents

Fuzzy multi‐criteria risk‐benefit analysis of business process outsourcing (BPO)

Selçuk Perçin

The objective of this paper is to present the employment of the new hierarchical fuzzy technique for order preference by similarity to ideal solution (TOPSIS) approach to evaluate…

3217

Comparison of sub‐Saharan Africa's e‐government status with developed and transitional nations

Stephen M. Mutula

The purpose of this paper is to compare the e‐government status of sub‐Saharan African countries with developed and transitional countries.

2723

Information security management objectives and practices: a parsimonious framework

Qingxiong Ma, Allen C. Johnston, J. Michael Pearson

As part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have proposed and…

3853

Process‐variance models in information security awareness research

Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos Kiountouzis

The purpose of this paper is to study the way information systems (IS) security researchers approach information security awareness and examine whether these approaches are…

4679

Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer

Yoones Asgharzadeh Sekhavat, Mohammad Fathian

In traditional commerce, an auction is known as a mechanism of determining the value of a commodity that does not have a fixed price. Auctions are exciting and an increasing…

An agent‐based privacy‐enhancing model

Hsu‐Hui Lee, Mark Stamp

The purpose of this paper is to discuss a privacy‐enhancing model, which is designed to help web users protect their private information. The model employs a collection of…

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid