Table of contents
Information priority‐setting for better resource allocation using analytic hierarchy process (AHP)
Eddie W.L. Cheng, Heng LiFocuses on the use of analytic hierarchy process (AHP) to prioritize different forms of information. Identification of the key information may help better allocation of resources…
A digital seal solution for deploying trust on commercial transactions
Stefanos Gritzalis, Dimitris GritzalisTraditional business practice depends on trust relations between the transacting parties. One of the most important aspects of this trust is the quality of the offered services or…
Intranets for organizational innovation
David C. Yen, David C. ChouBuilding intranets enhances organizational communication and information access. Intranets can be used to achieve the goals of business process reengineering and organizational…
Controlling corporate e‐mail, PC use and computer security
Gayle Webb White, Sheila J. PearsonThis study, conducted by two teachers in the areas of management and computer information systems, evolved because of the number of current articles that indicate that…
Security analysers: administrator assistants or hacker helpers?
Steven M. Furnell, Pelagia Chiliarchaki, Paul S. DowlandSecurity analyser tools provide a useful means of automatically identifying, and potentially exploiting, vulnerabilities within computer systems and networks but they are also of…