Information Management & Computer Security: Volume 4 Issue 2

Subjects:

Table of contents

A computer emergency response team policy

Charles Cresson Wood

Points out the job security risk to those responsible for the security of computerized information systems in the event of system failure resulting in financial loss. Argues that…

801

Corporate policy at Cable & Wireless enhances business efficiency and improves quality of working life

K.J. Fitzgerald

Describes how the business networks division of Cable & Wireless has pioneered a teleworking programme called “Global Office” which enables portable computer‐using managers and…

629

Mobile secure telephones

Charles Brookson

Describes GSM, a TMDA digital radio system which has more than 120 operators in over 60 countries and allows international roaming with only a contract between operators to…

724

Developing a suitable business continuity planning methodology

Goh Moh Heng

Presents the methodology used by a UK‐based multinational banking group to develop its business continuity plans. Describes the stages (modules) in the methodology sequentially…

3094

Data security report

K.J. Fitzgerald

Highlights the findings of an extensive, questionnaire‐based programme of research into data security among medium‐sized and large organizations in the UK. Comments on the ways in…

2319

Providing security for Unix networks

Bev Stymiest

Describes the TurnStyle family of security products developed by Atlantic Systems Group, of Fredericton, New Brunswick, to meet the security needs of Unix‐based networks. Claims…

Telework: threats, risks and solutions

Alice Sturgeon

Provides a definition of, and a background to, teleworking; points out the advantages to organizations and employees, and the economic and demographic factors which have…

3193

Collaborative computing, groupware and knowledge

Jan Duffy

Addresses the changes to organizations and to work life resulting from technology‐ enabled changes in the global economy. Postulates that collaboration, as distinct from…

1125

KPMG’s UK Computer Security Review 1994

Brian Kearvell‐White

Presents the findings of KPMG’s second computer security survey of 1,500 organizations. Defines computer security as comprising those procedures which ensure that computer‐held…

1454

Getting beyond the dark side of distributed computing

Randy Howe

Presents major findings from an in‐depth multi‐company American study on the effective management of the distributed computing environment. The study, led by Cambridge Technology…

818
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid