Table of contents
How well are corporate ethics codes and policies applied in the trenches?: Key factors and conditions
Thomas J. von der Embse, Mayur S. Desai, Seema DesaiAssesses the extent to which organizational ethics codes, credos and policies are implemented by managers and supervisors in their work. Further identifies and assesses the…
Cyberterrorism, computer crime, and reality
C. Bryan FoltzThe term cyberterrorism is being used with increasing frequency today. Since widespread concern with cyberterrorism is relatively new, understanding of the term is somewhat…
Nature of e‐business ethical dilemmas
Sonja Petrovic‐Lazarevic, Amrik S. SohalElectronic business is based on using computers and networks in all aspects of business. This new business concept is developing its own culture, which faces many ethical…
A long‐term trial of alternative user authentication technologies
S.M. Furnell, I. Papadopoulos, P. DowlandModern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username/password combinations, in spite…
Human resources for information management operations in Kuwaiti corporate companies
Sajjad ur Rehman, Laila MaroufInvestigates organizational arrangements and employment policies and practices of 31 Kuwaiti corporate companies in five selected information management operations: information…