Information Management & Computer Security: Volume 2 Issue 1

Subjects:

Table of contents

Optimum Information Technology for Socioeconomic Development

Christian N. Madu, Chu‐hua Kuei

Uses the analytic hierarchy process to identify and rank themulti‐criteria which influence the socioeconomic goal of improving thequality of life and then classify these factors…

895

Strategic Information Systems Planning: Its Adoption and Use

Simon Rogerson, Christine Fidler

Advances in information provision have led organizations to attempt todevelop IS/IT strategies which interrelate with their businessstrategies and which together support corporate…

5829

Security in Open and Distributed Systems

William J. Caelli

Distributed computing systems impose new requirements on the security ofthe operating systems and hardware structures of the computersparticipating in a distributed data network…

2238

Authentication: A Prominent Issue for Data Communications

David Hains

As data communication grows in importance, so the security aspects ofthis area demand greater attention. Of all the security issues affectingEDI, electronic authentication is a…

1018

Protection of Electronic Mail and Electronic Messages: Challenges and Solutions

Fredric B. Gluck

As more and more information is moved around the organization and theworld using the growing E‐mail and electronic messaging infrastructure,what technologies are available to…

4064

The Importance of a Network Disaster Recovery Plan

Kevin J. Fitzgerald

Network disaster recovery plans (DRPs) are just emerging as a businessissue. The need to make contingency plans in case of a computerdisaster, or major disruptions to the network…

1376
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid