Table of contents
Incorporating business strategy formulation with identity management strategy formulation
Cornelius Johannes Kruger, Mavis Noxolo MamaIdentity management (IdM) not only improves the process of creating and maintaining digital identities across business systems; it can, if implemented successfully, contribute to…
A framework for preventing money laundering in banks
Vandana Pramod, Jinghua Li, Ping GaoThe purpose of this paper is to form a new framework for preventing money laundering by mapping COBIT (Control for Information and Related Technology) processes to COSO (Committee…
An integrated model for online transactions: illuminating the black box
Vasilios KatosThe purpose of this paper is to develop a model for online transactions, integrating the social influence approach, the trust‐risk framework, and the theory of reasoned action…
Reliable and secure encryption key generation from fingerprints
Weiguo Sheng, Gareth Howells, Michael Fairhurst, Farzin Deravi, Shengyong ChenBiometric authentication, which requires storage of biometric templates and/or encryption keys, raises a matter of serious concern, since the compromise of templates or keys…
E‐commerce policies and customer privacy: a longitudinal study (2000‐2010)
Mayur S. Desai, Kiran J. Desai, Lonnie D. PhelpsThe present research is an updated and expanded continuation of an article by Parayitam et al. from 2008. The purpose of this study is to examine several internet policies and…