Table of contents
The application of information security policies in large UK‐based organizations: an exploratory investigation
Heather Fulford, Neil F. DohertyDespite its widely acknowledged importance, the information security policy has not, to date, been the subject of explicit, empirical scrutiny, in the academic literature. To help…
Enterprise integration with advanced information technologies: ERP and data warehousing
Yun Zeng, Roger H.L. Chiang, David C. YenIn today’s dynamic and changing environment, companies have a strong need to create or sustain their competitive advantages. In order to be competitive, companies need to be…
Stealth tracing: Subliminal Traceroute
H.J.A. (Rens) de Wolf, Marcel E.M. SpruitThe defence against ICT attacks requires detection of probes as early as possible. The earlier an attack is discovered, the more time defenders of systems have to take appropriate…
Global e‐commerce: a framework for understanding and overcoming the trust barrier
Hassan A. Aljifri, Alexander Pons, Daniel CollinsAs the Internet revolution moves into full swing, those countries that have not embraced e‐commerce technology will face new hurdles as they seek to develop their economies…
Using continuous user authentication to detect masqueraders
Alexandr Seleznyov, Seppo PuuronenNowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly…
A first approach to e‐forecasting: a survey of forecasting Web services
K. Nikolopoulos, K. Metaxiotis, V. Assimakopoulos, E. TavanidouA great challenge for today’s companies is not only how to adapt to the changing business environment but also how to gain a competitive advantage from the way in which they…