Information Management & Computer Security: Volume 4 Issue 1

Subjects:

Table of contents

A profile of the information technology executive

Liz Coghlan, Margaret Hurley

Describes a survey, undertaken by the Nolan Norton Institute in mid‐1995, of Australia’s senior IT (information technology) ranks. The objective of the survey was to gain a better…

960

A consensus ranking for information system requirements

Yong Shi, Pamela Specht, Justin Stolen

In allocating scarce resources to a new information system (IS), a non‐trivial task becomes the determination of a best priority ranking of the IS’s intangible information…

1652

A business approach to effective information technology risk analysis and management

Sharon Halliday, Karin Badenhorst, Rossouw von Solms

Suggests that a number of difficulties are experienced by organizations using conventional risk analysis and management. “Conventional” refers to those methodologies which are…

5908

Information security in business environments

Ethan Sanderson, Karen A. Forcht

Presents a young person’s view of the threats and security measures to deal with sensitive information in today’s constantly changing technological environment. Promotes the…

4345

Extinguishing halons

Greg Doddrell

Discusses the effectiveness and appropriateness of gas flooding systems to control fire in computer rooms. Explains the workings of such systems, detailing their components and…

255

Constructing difficult‐to‐guess passwords

Charles Cresson Wood

Passwords have a convenience which other access controls do not. However, they must be made more effective through difficult‐to‐guess, easy‐to‐remember techniques, supported by…

385

Knowledge technologies and business alignment

Douglas W. Brockway

Achieving lasting, profitable growth is often a matter of maintaining “alignment”. Companies need to ensure that their strategy, organization, processes, culture and systems…

1133

Commercial security on the Internet

Carrie Liddy

There is a growing trend to delivering more efficient and more effective products and services with fewer and fewer resources. This trend is reflected in both the commercial and…

1884
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid