Information Management & Computer Security: Volume 4 Issue 4

Subjects:

Table of contents

Doing business on the Internet: marketing and security aspects

Karen A. Forcht

Acknowledges that many prospective business users are wary of the Internet because of existing and potential security loopholes. Gives an overview of the security problems and…

3169

An integrated approach for system evaluation: study results

Mohamed H. Abdallah

Introduces an integrated approach for information system evaluation. The approach utilizes a model which consists of four parts: system environment; methodologies; documentation;…

946

Factors in the selection of a risk assessment method

Sharman Lichtenstein

A risk assessment method is used to carry out a risk assessment for an organization’s information security. Currently, there are many risk assessment methods from which to choose…

4820

The Ernst & Young International Information Security Survey 1995

Ernst, Young

Summarizes the results from a survey of 1,100 UK organizations and 1,300 US organizations. Disaster recovery plans have been established by most but not tested. Internet security…

1282

Information owners, custodians and users

Charles Cresson Wood

Defines a frequently encountered method for assigning information security responsibilities involving three terms: “owners”; “custodians”; and “users”. The objective of this…

451

The Thornton May Files

Thornton A. May

Pulls from extensive research and experience to provide commentary and insight on a range of management issues in the information technology world. Draws a picture of the issues…

230
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid