Table of contents
Novel biometric digital signatures for Internet‐based applications
P.K. Janbandhu, M.Y. SiyalPersonal identification numbers, passwords, smart cards and digital certificates are some of the means employed for user authentication in various electronic commerce…
Information technology outsourcing in Australia: a literature review
Christina CostaThe objective of this literature review is to provide a background and a synthesis of existing studies conducted on IT outsourcing. The IT outsourcing trend has become…
Domain names management: a strategy for electronic commerce security
Mary A. Clark, David C. Chou, David C. YenA good Internet domain names management allows electronic commerce participants to enjoy a convenient domain name registration process. Domain name owners will gain a high…
Security and trust management in supply chains
Ramesh Kolluru, Paul H. MeredithThe past decade in the area of supply chain management has been characterized by increased emphasis on collaboration between trading partners. The paradigm shift from competition…
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept
Martin Botha, Rossouw von SolmsA survey recently completed by the Computer Security Institute and the Federal Bureau of Investigation revealed that corporations, banks, and governments all face a growing threat…
IT outsourcing – managing the key asset
Margaret HurleyIt is sometimes forgotten, in the day‐to‐day management of business, that the only real asset in most outsourcing arrangements is the collection of individuals who execute the…