Logistics Information Management: Volume 15 Issue 5/6

Subjects:

Table of contents

An information security meta‐policy for emergent organizations

Richard Baskerville, Mikko Siponen

There is an increasing movement towards emergent organizations and an adaptation of Web‐based information systems (IS). Such trends raise new requirements for security policy…

3298

Security practice: survey evidence from three countries

M.J. Warren

Computer security is becoming a global problem. Recent surveys show that there increased concern about security risks such as hackers. There is also an increase in the growth of…

2047

A prototype tool for information security awareness and training

S.M. Furnell, M. Gennatou, P.S. Dowland

Information systems security is a critical issue for all organisations with a significant dependence upon information technology. However, it is a requirement that is often…

3550

Perceived information security, financial liability and consumer trust in electronic commerce transactions

Ramnath K. Chellappa, Paul A. Pavlou

Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information…

7766

Data protection and privacy: the Australian legislation and its implications for IT professionals

W.G. (Bill) Hewett, J. Whitaker

The notion of privacy takes on a completely different meaning when viewed from the perspective of an IT professional, an organisation using technology to support strategic…

2270

A security evaluation criteria

W.J. Brooks, M.J. Warren, W. Hutchinson

Computer security is now recognised as an important consideration in modern business, with a variety of guidelines and standards currently available to enable different business…

2590

Challenges of implementing public key infrastructure in Netcentric enterprises

Sunil Hazari

The explosive growth of e‐commerce has resulted in organizations sharing data over the Internet with other Netcentric organizations. Advances in telecommunications and networked…

1369

Information security for agent‐based WWW medical information retrieval

Steven Walczak

Electronic information retrieval is becoming a necessity for most businesses, including medical practice. Agent technology promises to provide a facile means for intelligently…

1917

Computer viruses: a quantitative analysis

A. Coulthard, T.A. Vuori

This paper provides interesting insights for anti‐virus research, as it reflects a period of rapid uptake in the application of the Internet and the use of e‐mail for business…

2335

Concepts in information warfare

W. Hutchinson

This paper examines the fundamental concepts needed to understand the broad spectrum of activities encompassed by the information warfare phenomenon. It provides a theoretical…

1405

Securing information infrastructure from information warfare

Sushil K. Sharma, Jatinder N.D. Gupta

The growing dependence on the Internet and related technologies has led to the creation of a new type of warfare, “information warfare” (infowar) which is based on attacking and…

2814

ISSN:

0957-6053

Renamed from:

Logistics World

Online date, start – end:

1989 – 2003

Copyright Holder:

Emerald Publishing Limited