Table of contents
Internet anonymity practices in computer crime
H.L. Armstrong, P.J. FordeMoney laundering, drug dealing, terrorism, hacking, fraud, child pornography and the distribution of objectionable material are crimes that are perpetrated using the Internet…
Decision support through knowledge management: the role of the artificial intelligence
Kostas Metaxiotis, Kostas Ergazakis, Emannuel Samouilidis, John PsarrasKnowledge management (KM) has recently received considerable attention in the computer information systems community and is continuously gaining interest by industry, enterprises…
Intrusion detection: methods and systems. Part II
Joseph S. Sherif, Rod AyersThis paper is part II of a previous article of the same title: Intrusion detection. Part II is concerned with intrusion threats, attacks, defense, models, methods and systems.
Toward strategic use of IT in SMEs: a developing country perspective
Z.T. Temtime, S.V. Chinyoka, J.P.W. ShundaThis article analyzes the strategic use of microcomputers and software packages in corporate planning and decision making in SMEs. Data were collected from 44 SMEs from three…
A security risk management approach for e‐commerce
M. Warren, W. HutchinsonE‐commerce security is a complex issue; it is concerned with a number of security risks that can appear at either a technical level or organisational level. This paper uses a…
An integrated system theory of information security management
Kwo‐Shing Hong, Yen‐Ping Chi, Louis R. Chao, Jih‐Hsing TangWith the popularity of electronic commerce, many organizations are facing unprecedented security challenges. Security techniques and management tools have caught a lot of…
An XML‐based administration method on role‐based access control in the enterprise environment
Cungang Yang, Chang N. ZhangProposes an object‐oriented role‐based access control (ORBAC) model to efficiently represent the real world. Though ORBAC is a good model, administration of ORBAC, including…