Table of contents
Deployment of anti‐virus software: a case study
Joseph S. Sherif, David P. GilliamThe growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining…
Application service providers: an application of the transaction cost model
Alan D. Smith, William T. RuppApplication service providers (ASPs) are expected to become a $25 billion industry by 2004. A firm’s decision to build or buy its IT infrastructure is dependent upon an…
E‐commerce policies and customer privacy
Mayur S. Desai, Thomas C. Richards, Kiran J. DesaiThe rapid growth of the Internet and the number of online consumers have resulted in increased fears from privacy advocates, legislators and consumer groups regarding the…
Information systems professionals and conflict of interest
Fritz GrupeConflicts of interest are situations in which a decision maker must balance personal interests with corporate or organizational interests. Often the conflict is unknown to others…
Networks security measures using neuro‐fuzzy agents
Nasser S. Abouzakhar, Gordon A. MansonThe growing dependence of modern society on telecommunication and information networks and e‐type systems has become inevitable. However, those types of systems are vulnerable to…
Customer relationship management (CRM) in business‐to‐business (B2B) e‐commerce
Yun E. Zeng, H. Joseph Wen, David C. YenCustomer relationship management (CRM) and business‐to‐business (B2B) are essential to the success of modern business. Although they are two different modules, they share many…