Information Management & Computer Security: Volume 20 Issue 3


Table of contents

Incorporating business strategy formulation with identity management strategy formulation

Cornelius Johannes Kruger, Mavis Noxolo Mama

Identity management (IdM) not only improves the process of creating and maintaining digital identities across business systems; it can, if implemented successfully…

A framework for preventing money laundering in banks

Vandana Pramod, Jinghua Li, Ping Gao

The purpose of this paper is to form a new framework for preventing money laundering by mapping COBIT (Control for Information and Related Technology) processes to COSO…

An integrated model for online transactions: illuminating the black box

Vasilios Katos

The purpose of this paper is to develop a model for online transactions, integrating the social influence approach, the trust‐risk framework, and the theory of reasoned…

Reliable and secure encryption key generation from fingerprints

Weiguo Sheng, Gareth Howells, Michael Fairhurst, Farzin Deravi, Shengyong Chen

Biometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or…

E‐commerce policies and customer privacy: a longitudinal study (2000‐2010)

Mayur S. Desai, Kiran J. Desai, Lonnie D. Phelps

The present research is an updated and expanded continuation of an article by Parayitam et al. from 2008. The purpose of this study is to examine several internet policies…

Cover of Information Management & Computer Security



Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access: