If you are experiencing problems downloading PDF or HTML fulltext, our helpdesk recommend clearing your browser cache and trying again. If you need help in clearing your cache, please click here . Still need help? Email help@ingentaconnect.com

Publisher: Emerald Group Publishing Limited

Related content
Volume 20, Number 3, 2012

< previous issue | all issues | next issue >

Favourites:Add to Favourites

Incorporating business strategy formulation with identity management strategy formulation
pp. 152-169(18)
Authors: Kruger, Cornelius Johannes; Mama, Mavis Noxolo

Favourites:Add to Favourites

A framework for preventing money laundering in banks
pp. 170-183(14)
Authors: Pramod, Vandana; Li, Jinghua; Gao, Ping

Favourites:Add to Favourites
Favourites:Add to Favourites

Reliable and secure encryption key generation from fingerprints
pp. 207-221(15)
Authors: Sheng, Weiguo; Howells, Gareth; Fairhurst, Michael; Deravi, Farzin; Chen, Shengyong

Favourites:Add to Favourites

E-commerce policies and customer privacy: a longitudinal study (2000-2010)
pp. 222-244(23)
Authors: Desai, Mayur S.; Desai, Kiran J.; Phelps, Lonnie D.

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more