Table of contents
New models for the management of public key infrastructure and root certification authorities
Stephen WilsonPublic key infrastructure (PKI) has been discussed for some time but has yet to command much attention from business or policy makers. The benefits of chaining certificate…
Managing and controlling computer misuse
Gurpreet DhillonThis paper argues that many of the losses owing to computer‐related fraud could be avoided if organizations adopt a more pragmatic approach in dealing with such incidents. The…
Internet‐based business opportunities: buyers beware of scams
Mohsen AttaranThe online consumer market is growing geometrically. Although online shopping offers convenience and saves time, it has its serious drawbacks as well. The Internet is a fabulous…
Avoiding securities class actions arising from Y2K issues
Brian W. Smith, Andrew J. MorrisThe threat of securities class actions haunts every public company. The threat probably is worst for information technology companies. Similarly, Y2K claims may threaten every…
Strategic business applications and new virtual knowledge‐based businesses through community‐based information networks
Mitsuru KodamaThis article will point out that fully utilizing community‐based information networks based on multimedia digital networking IT (information technology) supports managerial speed…