Table of contents
The use of business process modelling in information systems security analysis and design
S.A. Kokolakis, A.J. Demopoulos, E.A. KiountouzisThe increasing reliance of organisations on information systems connected to or extending over open data networks has established information security as a critical success factor…
Shielding your company against information compromise
Marilyn M. Helms, Lawrence P. Ettkin, Daniel J. MorrisWith the growth of information technologies and with more firms partnering, a major concern for organizations today is the protection of competitive information from thieving…
Awareness and challenges of Internet security
Steve Hawkins, David C. Yen, David C. ChouInternet security is an important issue today. Corporate data are at risk when they are exposed to the Internet. Current technologies provide a number of ways to secure data…
An exploratory inquiry into the perceived effectiveness of a global information system
Bowon Kim, Heungshik OhAs globalization has driven and has also been driven by innovation in information technology (IT), an effective utilization of IT has become critical in improving global…
Electronic commerce: the information‐security challenge
L. Labuschagne, J.H.P. EloffThe major reason why most people are still sceptical about electronic commerce is the perceived security risks associated with electronic transactions over the Internet. The…