Information Management & Computer Security: Volume 17 Issue 3

Subjects:

Table of contents

Requirement engineering elicitation methods: A Kuwaiti empirical study about familiarity, usage and perceived value

Kamel Rouibah, Sulaiman Al‐Rafee

The purpose of this paper is to investigate the perceptions of 19 requirement engineering (RE) techniques in Kuwait in term of three criteria “awareness,” “use,” and “perceived…

1889

A process model for customer relational assets creation: A case study of online securities trading platform

Tzu‐Chuan Chou, An‐Sheng Lee

The purpose of this research is to understand the practices of electronic customer relationship management (eCRM) and to establish a process model for online customers' relational…

1364

On consolidation model in e‐bill presentment and payment

Olufunke Vincent, Olusegun Folorunso, Ayodele Akinde

The purpose of this paper is to develop a multi‐user electronic bill presentment and payment (EBPP) model that would enhance the present billing systems as well as overcome the…

1286

Determinants of the critical success factor of disaster recovery planning for information systems

Wing S. Chow, Wai On Ha

Recent disaster recovery planning (DRP) literature has mainly focused on qualitative research, while neglecting the quantification of critical success factors (CSFs) for…

4249

Consumer motivations in taking action against spyware: an empirical investigation

Anil Gurung, Xin Luo, Qinyu Liao

The purpose of this paper is to develop a research framework and empirically analyze the factors that motivate the consumers to adopt and use anti‐spyware tools when they are…

1413
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid