Table of contents
The utilization of trend analysis in the effective monitoring of information security. Part 2: the model
Martin Botha, Rossouw von SolmsA survey recently completed by the Computer Security Institute (CSI) and the Federal Bureau of Investigation (FBI) revealed that corporations, banks, and governments all face a…
Biometric authentication: assuring access to information
Austin Jay Harris, David C. YenIn this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how…
Using business models and revenue streams for digital marketplace success
Mark LunnOver the last 18 months digital market places have gone through a difficult period of change, consolidation and closure. They have suffered from meagre transaction volumes and…
Evaluation and selection of an antivirus and content filtering software
Farrokh MamaghaniOrganizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of the Internet computer viruses. Given the rise in micro…
The impact of next generation XML
Billy B.L. Lim, H. Joseph WenOver the past few years, business‐to‐business (B2B) e‐commerce has grown exponentially. To conduct B2B e‐commerce, companies need a common language. HTML is not suited for this…
IT in manufacturing for performance: the challenge for Thai manufacturers
Ranjan B. KiniEarlier research showed through an empirical study of 60 US manufacturing companies that manufacturing proactiveness especially through investments in structural programs coupled…