Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Issue Section
Date
Availability
1-20 of 31
Keywords: Communication technologies
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Articles
Evaluating and enriching information and communication technologies compliance frameworks with regard to privacy
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2013) 21 (3): 177–190.
Published: 12 July 2013
... it does not provide guidance or best practices. © Emerald Group Publishing Limited 2013 ICT security and privacy standards Privacy compliance frameworks Recommendations for information privacy standards Data security Communication technologies Normative approaches for information...
Journal Articles
The 14‐layered framework for including social and organizational aspects in security management
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2011) 19 (2): 124–133.
Published: 07 June 2011
... and other internal documents; and 2. the practice of information security as expressed through interviews with representatives on the three decision levels EXE‐0, EXE‐1 and EXE2. Data security Information management Research Communication management Communication technologies...
Journal Articles
A review and future research directions of secure and trustworthy mobile agent‐based e‐marketplace systems
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2010) 18 (3): 144–161.
Published: 20 July 2010
..., secure, trusted, and auditable services, including forensic mechanisms for responding to and proofing against illegal activities. Ahmed Patel can be contacted at: apatel@ftsm.ukm.my © Emerald Group Publishing Limited 2010 Data security Information systems Communication technologies...
Journal Articles
Journal:
Information and Computer Security
Information Management & Computer Security (2009) 17 (5)
Published: 20 November 2009
... Spyros Kokolakis Maria Karyda Evangelos Kiountouzis This article originally appeared in Volume 16 Number 3, 2008, Information Management & Computer Security Biometrics Communication technologies Identification User interfaces ...
Journal Articles
Information technology security management concerns in global financial services institutions: Is national culture a differentiator?
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2009) 17 (5): 372–387.
Published: 20 November 2009
... and communication technologies (ICT), including the internet has become standard practice in the financial institutions industry (Johnson, 2000 ; Gupta et al., 2004 ; Business Wires, 2005 ; DTT‐Global Security Survey, 2006, 2007 ; Bank of Japan, 2007). With this increasingly universal use...
Journal Articles
A new English auction scheme using the bulletin board system
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2009) 17 (5): 408–417.
Published: 20 November 2009
... be revealed until the open stage. An ideal of English auction procedure should satisfy the requirements in the following (Lee et al., 2001 ; Nguyen and Traore, 2000 ; Omote and Miyaji, 2001): © Emerald Group Publishing Limited 2009 Communication technologies Auctions Data...
Journal Articles
A holistic framework for mCRM – data mining perspective
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2009) 17 (2): 151–165.
Published: 05 June 2009
... in mobile business. Data collection Data handling Customer relations Communication technologies We had conducted a study for understanding the need of data mining in mCRM. This led us to formulate the existing problem of uncovering hidden and unknown information from the customer data while...
Journal Articles
Exploring the importance and implementation of COBIT processes in Saudi organizations: An empirical study
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2009) 17 (2): 73–95.
Published: 05 June 2009
... Emerald Group Publishing Limited 2009 Communication technologies Information systems Developing countries Saudi Arabia For many organizations, information and the technology that supports it represents the organization's most valuable assets. Information and information technology...
Journal Articles
The importance of perceived trust, security and privacy in online trading systems
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2009) 17 (2): 96–113.
Published: 05 June 2009
... Data security Privacy Communication technologies Electronic commerce Traditional investing has experienced a revolution due to the rise of e‐trading services that enable investors to use the internet to conduct secure trading. Like a traditional broker, an online broker executes trades...
Journal Articles
IT disaster recovery: Oman and Cyclone Gonu lessons learned
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2009) 17 (2): 114–126.
Published: 05 June 2009
... Risk assessment Business continuity Communication technologies Oman In today's business environment information technology (IT) resources, including data, are some of the most important assets owned by organizations. Earthquakes, cyclones, hurricanes, floods, hackers, computer viruses...
Journal Articles
An integrated view of human, organizational, and technological challenges of IT security management
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2009) 17 (1): 4–19.
Published: 20 March 2009
... within a framework that illustrates the interplay between factors and the consequences of this interplay for organizations are integrated. Rodrigo Werlinger can be contacted at: rodrigow@ece.ubc.ca © Emerald Group Publishing Limited 2009 Data security Communication technologies...
Journal Articles
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (5)
Published: 21 November 2008
... © Emerald Group Publishing Limited 2008 --> Biometrics Communication technologies Identification User interfaces Article Type: Awards for Excellence From: Information Management & Computer Security, Volume 16, Issue 5 The application of signature recognition...
Journal Articles
Managed IT services: the role of IT standards
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (4): 336–359.
Published: 10 October 2008
... to IT departments and end‐users of their clients. Narayanan Kumbakara can be contacted at: kumbakara@gmail.com © Emerald Group Publishing Limited 2008 Communication technologies Outsourcing Service levels MSPs deliver proactive IT management services to their clients. MSPs have processes...
Journal Articles
Comparison of sub‐Saharan Africa's e‐government status with developed and transitional nations
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (3): 235–250.
Published: 18 July 2008
.... Mutula can be contacted at: mutulasm@mopipi.ub.bw © Emerald Group Publishing Limited 2008 Government Communication technologies Sub‐Saharan Africa The term e‐government has now come of age and is generally used to refer to the application of advanced information and communication...
Journal Articles
Interpretive structural modeling (ISM) of IT‐enablers for Indian manufacturing SMEs
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (2): 113–136.
Published: 06 June 2008
... into four categories, namely, autonomous, driver, dependent, and linkage to understand their relative impact on the implementation of IT in Indian SMEs. Practical implications The advancement in IT presents opportunities for SMEs to harness the benefits of information and communication technologies...
Journal Articles
An analysis of mobile credit card usage intentions
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (4): 260–269.
Published: 21 August 2007
.... Perceived credibility has a positive effect on Malaysia bank customers' usage intentions. © Emerald Group Publishing Limited 2007 Credit cards Malaysia Communication technologies Banking Islam The development in mobile‐based technologies has provided many chances for new innovation...
Journal Articles
The application of signature recognition to transparent handwriting verification for mobile devices
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (3): 214–225.
Published: 12 June 2007
... usability and privacy concerns. User interfaces Biometrics Identification Communication technologies The use of biometrics, or specifically unique human characteristics, has existed for hundreds of years in one form or another, whether it is a physical description of a person or perhaps more...
Journal Articles
Analyzing bloggers data on software design patterns and applications integration; methodology and implementation
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (2): 84–101.
Published: 01 May 2007
...@bolton.ac.uk © Emerald Group Publishing Limited 2007 Internet Communication technologies Communication Public opinion There are different methodologies available for accessing data on the internet including; link analysis, transactions log analysis and blogs trend analysis. Such data...
Journal Articles
Outsourcing digital signatures: a solution to key management burden
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2006) 14 (5): 436–449.
Published: 01 October 2006
... a specific technical approach for the implementation of a signature outsourcing scheme and finally in Section 6, we conclude the paper. Dimitrios Lekkas can be contacted at: dlek@aegean.gr © Emerald Group Publishing Limited 2006 Communication technologies Information systems Data security...
Journal Articles
A framework for outsourcing IS/IT security services
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2006) 14 (5): 403–416.
Published: 01 October 2006
... in vendors located in developing countries. Communication technologies Outsourcing Information systems Data security European directives Outsourcing refers to the procurement of products and/or services from sources that are external to an organization. Within the last 15 years...
1
