Table of contents
Formulating information systems risk management strategies through cultural theory
Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis, Evangelos KiountouzisThe purpose of this paper is to examine the potential of cultural theory as a tool for identifying patterns in the stakeholders' perception of risk and its effect on information…
Issue report on business adoption of Microsoft Passport
Kim‐Kwang Raymond ChooThe purpose of this paper is to examine the feasibility and desirability of using the Microsoft Passport service for client authentication and authorization. It aims to present…
Achieving automated intrusion response: a prototype implementation
M. Papadaki, S.M. FurnellThe increasing speed and volume of attacks against networked systems highlights the need to automate the intrusion response process. This paper proposes a means by which such…
Home page usability and credibility: A comparison of the fastest growing companies to the Fortune 30 and the implications to IT governance
William Brown, Mezbahur Rahman, Travis HackerThe purpose of the research was to compare web site designs used by the fastest growing companies in the USA to the largest companies in the USA and to benchmark those designs…
Trust, privacy, and security in electronic business: the case of the GCC countries
Zeinab Karake ShalhoubThe lack of trust in online transactions is one of the main reasons for the relatively low electronic commerce adoption, especially in developing and emerging economies such as…
Duty of care involving outsourced payroll
Richard Mou, Brian KleinerTo review the issues surrounding the outsourcing of payroll.