Table of contents
An analysis of mobile credit card usage intentions
Hanudin AminMany banks consider mobile‐based technologies have improved the banking services through introduction of new banking facilities. One of the latest facilities developed in this…
An empirical study of ERP success evaluations by business and IT managers
Princely IfinedoThe purpose of this study is to examine how two organizational members, i.e. business and information technology (IT) managers evaluate the success measures of acquired enterprise…
A STOPE model for the investigation of compliance with ISO 17799‐2005
Mohamed Saad Saleh, Abdullah Alrabiah, Saad Haj BakryWith the widespread of e‐services, provided by different organizations at the internal intranet level, the business extranet level, and the public internet level, compliance with…
A PRoactive malware identification system based on the computer hygiene principles
Vasileios Vlachos, Diomidis SpinellisTo present a new technique that contains the spread of rapid malcode, which is based on peer‐to‐peer (P2P) communication and the principles of computer hygiene.
Personalized biometric key using fingerprint biometrics
Ong Thian Song, Andrew Teoh Beng Jin, Tee ConnieThis paper aims to address some of the practical and security problems when using fingerhash to secure biometric key for protecting digital contents.