Information Management & Computer Security: Volume 2 Issue 5

Subjects:

Table of contents

The Information Highway: : The Interstate Highway System for Computer Networks

Karen A. Forcht, Morey Oare

Provides a strong basic definition of the Information Highway (IH),including security, hardware and software and discusses the futureramifications. Identifies the four main…

433

The Clipper Chip and the Price of Security in America

James R. Butler, Karen A. Forcht

The information explosion had led to the emergence of electronic crimeboth in the transfer of electronic funds and the gaining of information.Reports on the introduction of the…

350

Whither Cryptography

Ross J. Anderson

There are three widely held beliefs about cryptology which underpin muchresearch on the subject, guide substantial industrial investment andinform most of the associated public…

749

A Study of Information Technology Structure: Firm Ownership and Managerial Characteristics

Zeinab A. Karake

Seeks to isolate those intra‐organizational factors affecting theinformation technology (IT) structure of the firm. Analyses thisphenomenon from two management perspectives: the…

1476

Information Search Behaviour during Business Gestation

Jon‐Arild Johannessen, Lars Kolvereid

Describes a research project to identify an information search patternamong entrepreneurs so that agencies devoted to the promotion of newbusiness might allocate their resources…

609
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid