Table of contents
Fuzzy multi‐criteria risk‐benefit analysis of business process outsourcing (BPO)
Selçuk PerçinThe objective of this paper is to present the employment of the new hierarchical fuzzy technique for order preference by similarity to ideal solution (TOPSIS) approach to evaluate…
Comparison of sub‐Saharan Africa's e‐government status with developed and transitional nations
Stephen M. MutulaThe purpose of this paper is to compare the e‐government status of sub‐Saharan African countries with developed and transitional countries.
Information security management objectives and practices: a parsimonious framework
Qingxiong Ma, Allen C. Johnston, J. Michael PearsonAs part of their continuing efforts to establish effective information security management (ISM) practices, information security researchers and practitioners have proposed and…
Process‐variance models in information security awareness research
Aggeliki Tsohou, Spyros Kokolakis, Maria Karyda, Evangelos KiountouzisThe purpose of this paper is to study the way information systems (IS) security researchers approach information security awareness and examine whether these approaches are…
Efficient anonymous secure auction schema (ASAS) without fully trustworthy auctioneer
Yoones Asgharzadeh Sekhavat, Mohammad FathianIn traditional commerce, an auction is known as a mechanism of determining the value of a commodity that does not have a fixed price. Auctions are exciting and an increasing…
An agent‐based privacy‐enhancing model
Hsu‐Hui Lee, Mark StampThe purpose of this paper is to discuss a privacy‐enhancing model, which is designed to help web users protect their private information. The model employs a collection of…