Information Management & Computer Security: Volume 8 Issue 3

Subjects:

Table of contents

The use of business process modelling in information systems security analysis and design

S.A. Kokolakis, A.J. Demopoulos, E.A. Kiountouzis

The increasing reliance of organisations on information systems connected to or extending over open data networks has established information security as a critical success factor…

3933

Shielding your company against information compromise

Marilyn M. Helms, Lawrence P. Ettkin, Daniel J. Morris

With the growth of information technologies and with more firms partnering, a major concern for organizations today is the protection of competitive information from thieving…

2122

Awareness and challenges of Internet security

Steve Hawkins, David C. Yen, David C. Chou

Internet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data…

10725

An exploratory inquiry into the perceived effectiveness of a global information system

Bowon Kim, Heungshik Oh

As globalization has driven and has also been driven by innovation in information technology (IT), an effective utilization of IT has become critical in improving global…

1535

Electronic commerce: the information‐security challenge

L. Labuschagne, J.H.P. Eloff

The major reason why most people are still sceptical about electronic commerce is the perceived security risks associated with electronic transactions over the Internet. The…

3427
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid