Skip to Main Content
Keywords: Communication technologies
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal Articles
Information Management & Computer Security (2011) 19 (2): 124–133.
Published: 07 June 2011
... and other internal documents; and 2. the practice of information security as expressed through interviews with representatives on the three decision levels EXE‐0, EXE‐1 and EXE2. Data security Information management Research Communication management Communication technologies...
Journal Articles
Journal Articles
Information Management & Computer Security (2009) 17 (5)
Published: 20 November 2009
... Spyros Kokolakis Maria Karyda Evangelos Kiountouzis This article originally appeared in Volume 16 Number 3, 2008, Information Management & Computer Security Biometrics Communication technologies Identification User interfaces ...
Journal Articles
Journal Articles
Information Management & Computer Security (2009) 17 (5): 408–417.
Published: 20 November 2009
... be revealed until the open stage. An ideal of English auction procedure should satisfy the requirements in the following (Lee et al., 2001 ; Nguyen and Traore, 2000 ; Omote and Miyaji, 2001): © Emerald Group Publishing Limited 2009 Communication technologies Auctions Data...
Journal Articles
Information Management & Computer Security (2009) 17 (2): 151–165.
Published: 05 June 2009
... in mobile business. Data collection Data handling Customer relations Communication technologies We had conducted a study for understanding the need of data mining in mCRM. This led us to formulate the existing problem of uncovering hidden and unknown information from the customer data while...
Journal Articles
Information Management & Computer Security (2009) 17 (2): 73–95.
Published: 05 June 2009
... Emerald Group Publishing Limited 2009 Communication technologies Information systems Developing countries Saudi Arabia For many organizations, information and the technology that supports it represents the organization's most valuable assets. Information and information technology...
Journal Articles
Information Management & Computer Security (2009) 17 (2): 96–113.
Published: 05 June 2009
... Data security Privacy Communication technologies Electronic commerce Traditional investing has experienced a revolution due to the rise of e‐trading services that enable investors to use the internet to conduct secure trading. Like a traditional broker, an online broker executes trades...
Journal Articles
Information Management & Computer Security (2009) 17 (2): 114–126.
Published: 05 June 2009
... Risk assessment Business continuity Communication technologies Oman In today's business environment information technology (IT) resources, including data, are some of the most important assets owned by organizations. Earthquakes, cyclones, hurricanes, floods, hackers, computer viruses...
Journal Articles
Information Management & Computer Security (2009) 17 (1): 4–19.
Published: 20 March 2009
... within a framework that illustrates the interplay between factors and the consequences of this interplay for organizations are integrated. Rodrigo Werlinger can be contacted at: rodrigow@ece.ubc.ca © Emerald Group Publishing Limited 2009 Data security Communication technologies...
Journal Articles
Information Management & Computer Security (2008) 16 (5)
Published: 21 November 2008
... © Emerald Group Publishing Limited 2008 --> Biometrics Communication technologies Identification User interfaces Article Type: Awards for Excellence From: Information Management & Computer Security, Volume 16, Issue 5 The application of signature recognition...
Journal Articles
Information Management & Computer Security (2008) 16 (4): 336–359.
Published: 10 October 2008
... to IT departments and end‐users of their clients. Narayanan Kumbakara can be contacted at: kumbakara@gmail.com © Emerald Group Publishing Limited 2008 Communication technologies Outsourcing Service levels MSPs deliver proactive IT management services to their clients. MSPs have processes...
Journal Articles
Information Management & Computer Security (2008) 16 (3): 235–250.
Published: 18 July 2008
.... Mutula can be contacted at: mutulasm@mopipi.ub.bw © Emerald Group Publishing Limited 2008 Government Communication technologies Sub‐Saharan Africa The term e‐government has now come of age and is generally used to refer to the application of advanced information and communication...
Journal Articles
Information Management & Computer Security (2008) 16 (2): 113–136.
Published: 06 June 2008
... into four categories, namely, autonomous, driver, dependent, and linkage to understand their relative impact on the implementation of IT in Indian SMEs. Practical implications The advancement in IT presents opportunities for SMEs to harness the benefits of information and communication technologies...
Journal Articles
Information Management & Computer Security (2007) 15 (4): 260–269.
Published: 21 August 2007
.... Perceived credibility has a positive effect on Malaysia bank customers' usage intentions. © Emerald Group Publishing Limited 2007 Credit cards Malaysia Communication technologies Banking Islam The development in mobile‐based technologies has provided many chances for new innovation...
Journal Articles
Information Management & Computer Security (2007) 15 (3): 214–225.
Published: 12 June 2007
... usability and privacy concerns. User interfaces Biometrics Identification Communication technologies The use of biometrics, or specifically unique human characteristics, has existed for hundreds of years in one form or another, whether it is a physical description of a person or perhaps more...
Journal Articles
Journal Articles
Information Management & Computer Security (2006) 14 (5): 436–449.
Published: 01 October 2006
... a specific technical approach for the implementation of a signature outsourcing scheme and finally in Section 6, we conclude the paper. Dimitrios Lekkas can be contacted at: dlek@aegean.gr © Emerald Group Publishing Limited 2006 Communication technologies Information systems Data security...
Journal Articles
Information Management & Computer Security (2006) 14 (5): 403–416.
Published: 01 October 2006
... in vendors located in developing countries. Communication technologies Outsourcing Information systems Data security European directives Outsourcing refers to the procurement of products and/or services from sources that are external to an organization. Within the last 15 years...

or Create an Account

Close Modal
Close Modal