Information Management & Computer Security: Volume 18 Issue 4

Subjects:

Table of contents

Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups

Sigi Goode

Software piracy is an ongoing problem for software producers. At the same time, mobile devices such as personal digital assistants and smart phones are increasing in popularity…

2207

Information security governance in Saudi organizations: an empirical study

Ahmad Abu‐Musa

This paper seeks to empirically examine the existence and implementation of information security governance (ISG) in Saudi organizations.

4121

A survey of intrusion detection and prevention systems

Ahmed Patel, Qais Qassim, Christopher Wills

The problem of protecting information and data flows has existed from the very first day of information exchange. Various approaches have been devised to protect and transfer such…

4704

Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system

Dimitrios Patsos, Sarandis Mitropoulos, Christos Douligeris

The paper proposes looking at the automation of the incident response (IR) process, through formal, systematic and standardized methods for collection, normalization and…

Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid