Information Management & Computer Security: Volume 16 Issue 4

Subjects:

Table of contents

Escalation and premature termination in MIS projects: the role of real options

Dmitriy V. Chulkov, Mayur S. Desai

The purpose of this paper is to examine how the real option theory is applicable to evaluation of cases of escalation and premature termination of Management Information Systems…

1813

Managed IT services: the role of IT standards

Narayanan Kumbakara

The purpose of this paper is to explore the practical issues regarding standards and the management of IT services delivered by external or outsourced service providers called…

6092

A cross‐cultural investigation of situational information security awareness programs

Charlie C. Chen, B. Dawn Medlin, R.S. Shaw

The aim of this research is to make users aware of the importance surrounding the issue of security and security awareness while at the same time making educators as well as other…

2721

Implementation and effectiveness of organizational information security measures

Janne Merete Hagen, Eirik Albrechtsen, Jan Hovden

The purpose of this paper is to study the implementation of organizational information security measures and assess the effectiveness of such measures.

7114

Securing SCADA systems

Sandip C. Patel, Pritimoy Sanyal

Supervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and…

2348

Biometrics in banking security: a case study

Sitalakshmi Venkatraman, Indika Delpachitra

To identify and discuss the issues and success factors surrounding biometrics, especially in the context of user authentication and controls in the banking sector, using a case…

6656
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid