Information Management & Computer Security: Volume 6 Issue 4


Table of contents

Watching systems in action: security at the periphery

Fritz H. Grupe, James M. Hensley, Jeanne H. Yamamura

Computer security is maintained in many ways. New systems are developed with an eye towards protecting against known techniques for bypassing system controls. New methods…

Features and functions overload

Margaret A. Hurley

Addresses the issue of the addition of features and functions to end‐user computer systems in an effort to increase the productivity of users. Argues that the core…

Trust in Web‐based electronic commerce security

Pauline Ratnasingham

Electronic commerce is about business. Businesses are built on relationships and relationships are built on trust, especially in today’s virtual competitive world. Trust…

Information security awareness: educating your users effectively

M.E. Thomson, R. von Solms

This article investigates the evolution of computing, with specific reference to the security issues involved. These issues are then taken further to determine the need…

Information security management (1): why information security is so important

Rossouw von Solms

Information security has become very important in most organizations. The main reason for this is that access to information and the associated resources has become easier…

Internet security: a case study of firewall selection

H. Joseph Wen, Jyh‐Horng Michael Tarn

The Internet itself was not designed with security in mind. It was originally designed for research purposes, with open access to willing and able participants. Only…

Cover of Information Management & Computer Security



Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access: