Table of contents
Incorporating WS‐Security into a Web services‐based portal
Billy B.L. Lim, Yan Sun, Joaquin VilaSoftware reuse and systems interoperability have been the primary goals of many IT organizations as a means to curb software cost. While there were spots of success over the…
RECOT: an expert system for the reduction of environmental cost in the textile industry
Kostas MetaxiotisEnvironmental legislation and its enforcement has undoubtedly forced the textile industry to be rather cautious in selecting the appropriate processes and equipment. The most…
Exploring the failure and success of DotComs
Muhammad A. Razi, J. Michael Tarn, Faisal A. SiddiquiThe Internet added another dimension to traditional commerce when online business became available. Because of the mushroom growth of online businesses in the late 1990s, DotCom…
An exploration of wireless computing risks: Development of a risk taxonomy
Bouchaib Bahli, Younes BenslimaneWireless computing, as a way of providing mobile services, has been growing steadily during the past few years. While wireless communications offer organizations and users many…
Enhancing Web privacy and anonymity in the digital era
Stefanos GritzalisThis paper presents a state‐of‐the‐art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture…
Genetic algorithms: A business perspective
Fritz H. Grupe, Simon JoosteDescribes one of the newest forms of artificial intelligence being applied to the solution of business problems – the genetic algorithm (GA). GAs are useful when a problem has…