Table of contents
The biometric technologies business case: a systematic approach
Richard A. Riley, Virginia Franke KleistThis paper aims to assist readers to develop a compelling business case, including quantifiable and non‐quantifiable costs and benefits, for the deployment of biometric…
An empirical study of the effect of perceived risk upon intention to use online applications
Hsi‐Peng Lu, Chin‐Lung Hsu, Hsiu‐Ying HsuThe Technology Acceptance Model (TAM ) has been used to interpret people's adoptions of several kinds of technology. However, while people accept online application service…
E‐enterprise security management life cycle
Stephen C. Shih, H. Joseph WenOne of the purposes of this paper is to discuss special security concerns and new challenges at front‐end e‐business and back‐end supply chain operations. An e‐enterprise security…
Information technology project failures: Applying the bandit problem to evaluate managerial decision making
Dmitriy V. Chulkov, Mayur S. DesaiThis paper seeks to apply results from the study of bandit processes to cases of information technology (IT) project failures.
A conceptual model for enterprise resource planning (ERP)
Carl Marnewick, Lessing LabuschagneThis article seeks to provide a conceptual model that explains the complexity of an enterprise resource planning (ERP) system to general and project managers in a non‐technical…
An automated framework for managing security vulnerabilities
A. Al‐Ayed, S.M. Furnell, D. Zhao, P.S. DowlandThis paper aims to look at unpatched software which represents a significant problem for internet‐based systems, with a myriad malware incidents and hacker exploits taking…
Development of a qualitative reasoning model for financial forecasting
Someswar Kesh, M.K. RajaTo develop a model for financial forecasting using the principles of qualitative reasoning.