Information Management & Computer Security: Volume 9 Issue 1

Subjects:

Table of contents

E‐commerce Web site design: strategies and models

H. Joseph Wen, Houn‐Gee Chen, Hsin‐Ginn Hwang

The rapid adoption of the Web as a commercial medium has caused firms to experiment with innovative ways of doing business. Those firms that effectively market themselves on the…

14090

Model calculations to estimate the probability of secret reconstruction in computer environments

Ching‐Yun Lee, Yi‐Shiung Yeh, Deng‐Jyi Chen

Information technologies have ushered in a new era for computer‐related communications. Use of the Internet for commercial applications and resource sharing has accelerated in…

Information systems security in the Greek public sector

Euripidis Loukis, Diomidis Spinellis

The security aspects of public sector information systems are important as the respective systems are often part of critical infrastructures or deal with personal or sensitive…

2047

Formalizing information security requirements

Mariana Gerber, Rossouw von Solms, Paul Overbeek

Risk analysis, concentrating on assets, threats and vulnerabilities, used to play a major role in helping to identify the most effective set of security controls to protect…

5173

Robust intrusion tolerance in information systems

Nong Ye

Intrusions exploit vulnerabilities and introduce external disturbances into information systems to compromise security attributes of information systems such as availability…

4101

Building ontologies for production scheduling systems: towards a unified methodology

Kostas S. Metaxiotis, John E. Psarras, Dimitris Askounis

In this paper we consider the use of ontologies as the basis for structuring and simplifying the process of constructing real‐time problem‐solving tools, focusing specifically on…

1375
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid