Table of contents
Intelligent authentication, authorization, and administration (I3A)
Dan EigelesAims to present intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement…
Information security: management's effect on culture and policy
Kenneth J. Knapp, Thomas E. Marshall, R. Kelly Rainer, F. Nelson FordThis study proposes to put forward and test a theoretical model that demonstrates the influence of top management support on an organization's security culture and level of…
Earned value management in a data warehouse project
J. Art Gowan, Richard G. Mathieu, Mark B. HeySets out to examine earned value management (EVM), a project management technique that relates resource planning to schedules, technical costs and schedule requirements.
Competency based management: a review of systems and approaches
Fotis Draganidis, Gregoris MentzasAims to review the key concepts of competency management (CM) and to propose method for developing competency method.
Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures
Kevin Curran, Sheila McKinneySeeks to demonstrate how, with regard to viewing video on the internet, the delay experienced, whilst the stream is being buffered, can be virtually eradicated.
A novel watermarking algorithm for resistant geometric attacks using feature points matching
Jin CongAims to report a novel method of estimating the geometric manipulation to which present day data hiding is subjected.