Information Management & Computer Security: Volume 9 Issue 2

Subjects:

Table of contents

Information priority‐setting for better resource allocation using analytic hierarchy process (AHP)

Eddie W.L. Cheng, Heng Li

Focuses on the use of analytic hierarchy process (AHP) to prioritize different forms of information. Identification of the key information may help better allocation of resources…

2439

A digital seal solution for deploying trust on commercial transactions

Stefanos Gritzalis, Dimitris Gritzalis

Traditional business practice depends on trust relations between the transacting parties. One of the most important aspects of this trust is the quality of the offered services or…

1100

Intranets for organizational innovation

David C. Yen, David C. Chou

Building intranets enhances organizational communication and information access. Intranets can be used to achieve the goals of business process reengineering and organizational…

4541

Controlling corporate e‐mail, PC use and computer security

Gayle Webb White, Sheila J. Pearson

This study, conducted by two teachers in the areas of management and computer information systems, evolved because of the number of current articles that indicate that…

2511

Security analysers: administrator assistants or hacker helpers?

Steven M. Furnell, Pelagia Chiliarchaki, Paul S. Dowland

Security analyser tools provide a useful means of automatically identifying, and potentially exploiting, vulnerabilities within computer systems and networks but they are also of…

2694
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid