Information Management & Computer Security: Volume 6 Issue 1

Subjects:

Table of contents

METANET: a five‐year Internet strategy

R.K.R.P. Puthli

States that the rate of change of Internet technology is alarmingly high. The main question addressed in this article is: how can organizations cope whose main activities are not…

From client/server to intranet

H. Joseph Wen

An intranet puts a new layer into a client/server (C/S) architecture, the Web server, which acts as the gateway to the application logic and data. It is three‐tier computing…

1315

Seamless secured transactions

Carrie Liddy, Alice Sturgeon

Discusses the requirements ‐ both technical and geopolitical ‐ for enabling seamless, secure transactions over the Internet. Discusses options in technical approaches, including…

675

Business continuity: awareness and training programmes

Gregory Morwood

States that business survival depends on the assured continuity of core business activities and supporting services. Business continuity (BC) plans are therefore developed to…

2781

Internet‐based EDI trust and security

Pauline Ratnasingham

While the term “electronic commerce” was a buzzword in the early 1990s, it has fast become an essential business tool as we approach the next century. In traditional EDI many of…

2373
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid