Table of contents
An XML‐based architecture for data integration in vulnerability assessments
Andrew Blyth, Paula ThomasOne of the problems facing systems administrators and security auditors is that a security test/audit can generate a vast quantity of information that needs to be stored, analysed…
Data mining as a technique for knowledge management in business process redesign
O. Folorunso, A.O. OgundeBusiness process redesign (BPR) is undertaken to achieve order‐of‐magnitude improvements over “old” forms of the organization. Practitioners in academia and the business world…
Conceptualizing strategic issues in information technology outsourcing
Niranjan Pati, Mayur S. DesaiIt is posited that information technology (IT) outsourcing unfolds a complex relationship that has the propensity to start with a bang and end in a whimper unless the strategic…
Information systems security issues and decisions for small businesses: An empirical examination
Atul Gupta, Rex HammondThe objective of this study is to gather information about information technology (IT) related security issues in small firms in both manufacturing and service.
What ERP systems can tell us about Sarbanes‐Oxley
William Brown, Frank NasutiTo provide background for senior and middle management in information technology organizations who may be in the implementation phase of compliance for Sarbanes‐Oxley (SOX). As…
Dynamic content attacks on digital signatures
Adil Alsaid, Chris J. MitchellAims to address some of the problems that arise when signing digital documents that contain dynamic content.