Table of contents
The selection of instant messaging or e‐mail: College students' perspective for computer communication
Sean Lancaster, David C. Yen, Albert H. Huang, Shin‐Yuan HungInstant messaging and e‐mail are popular communication methods on college campuses. However, students' perceptions of the two technologies vary greatly. This study seeks to…
Image edge detection: A knowledge management technique for visual scene analysis
O. Folorunso, O.R. Vincent, B.M. DansuThis paper seeks to describe the use of edge‐detection as an approach to support the process of analyzing visual scenes.
Solvable problems in enterprise digital rights management
E. John Sebes, Mark StampDigital rights management (DRM) is often promoted as the technical basis for solutions to enterprise security problems requiring persistent protection. Yet to date, DRM has failed…
Evaluating the security controls of CAIS in developing countries: An examination of current research
Ahmad A. Abu‐MusaThe main objective of the paper is to investigate the existence and adequacy of implemented Computerized Accounting Information Systems (CAIS) security controls to prevent, detect…
A strategic modeling technique for information security risk assessment
Subhas C. Misra, Vinod Kumar, Uma KumarThis paper seeks to present a conceptual modeling approach, which is new in the domain of information systems security risk assessment.