Table of contents
Embedding privacy in IT applications development
Dimitris A. GritzalisA considerable research stream in information systems security has elaborated several propositions as to how privacy and anonymity can be protected, the most prominent of which…
A new two‐tiered strategy to intrusion detection
A.S. Sodiya, H.O.D. Longe, A.T. AkinwaleResearchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work is to combine…
D‐TIFIS: a decision support system for options trading
K. Maris, K. Metaxiotis, G. Pantou, K. Nikolopoulos, E. Tavanidou, V. AssimakopoulosSome analysts have claimed that the volatility of an asset is caused solely by the random arrival of new information about the future returns from the asset. Others have claimed…
Role of trust in e‐business success
S. SrinivasanSuccess of an e‐business rests on many factors. One of the important contributors is trust. Trust is something that an e‐business must strive to achieve over a period of time…
Adopting e‐commerce Web site operation modes: The current state of large US firms
Jau‐Yang Liu, J. Michael Tarn, H. Joseph WenThis paper applies an analytical framework to assess e‐commerce (EC) Web sites of large US firms. It first examines the available EC operation modes and then discusses the EC…
From risk analysis to effective security management: towards an automated approach
Vassilis Tsoumas, Theodore TryfonasEffective and risk‐free operation of modern information systems relies heavily on security practices and overall information security management. Usually, organizations perform…
Exploring the impacts of P2P networks on the entertainment industry
William T. Rupp, Alan D. SmithAny solution that will solve the problem the entertainment industry is currently facing will need to address the underlying theme in the decline of self‐policing and morally…
A data mining approach to neural network training
Moncef Belhadjali, Gary L. WhaleyNeural networks are widely used in model building. Applications include predicting bankruptcy, and assessing the relationship quality between a customer and a salesperson. This…
On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements
V. Zorkadis, P. DonosBiometric techniques, such as fingerprint verification, iris or face recognition, retina analysis and hand‐written signature verification, are increasingly becoming basic elements…