Information Management & Computer Security: Volume 3 Issue 2

Subjects:

Table of contents

Data integrity and the Internet:: implications for management

Richard G. Mathieu, Robert L. Woodard

The Internet is increasingly used by management professionals tosupport information gathering and research activities. However, thedifferent sources of information on the Internet…

740

Information security baselines

Kevin J. Fitzgerald

Describes a set of “baseline” threats and presents thereasoning behind the “baseline” security approach. Discussesan example of the acceptance of the security baseline approach…

2802

Legal control of computer crime in Hong Kong

Matthew K. O. Lee

One of the main aims of information systems security (ISS) is toprevent unauthorized access to and tampering with information systemsresources. In April 1993 the first ever…

1636

Promoting security awareness and commitment

Phil Spurling

Sees security awareness promotion as part of the overallorganization – its culture, philosophy and vision. Presents a casestudy of a major Australian organization. Traces the…

3959

Erratum

This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/01443579410056074. When citing the…

744

The utility of information systems views of CEOs and information system executives

Mahmoud M. Yasin, John V. Quigley

Examines the views of 25 chief executive officers and theirinformation systems executives on the utility of information systems intheir organizations. Detects a gap between these…

11588
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid