Table of contents
A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems
Ahmed Patel, Wei Qi, Christopher WillsThere is a need to provide secure and safe information security systems through the use of firewalls, intrusion detection and prevention systems, encryption, authentication, and…
Brand, knowledge, and false sense of security
Wendy HuiThe purpose of this paper is to study how brand name can affect consumers' perceived protection from security technologies. It also seeks to investigate the significance of…
Justifying the need for a data security management plan for the UAE
K. Al‐Awadi, M. SaidaniAs the United Arab Emirates (UAE) organizations are embarking onto the intensive technology world where the exchange of information is increasingly taking place through electronic…
Finding middle ground management strategy for software development
Zvi Goldstein, David Petrie, Yosef SherifThe purpose of this paper is to advance a dynamic programming model that encompasses critical attributes of plan‐driven development, rapid development, agile development, and the…