Information Management & Computer Security: Volume 6 Issue 4

Subjects:

Table of contents

Watching systems in action: security at the periphery

Fritz H. Grupe, James M. Hensley, Jeanne H. Yamamura

Computer security is maintained in many ways. New systems are developed with an eye towards protecting against known techniques for bypassing system controls. New methods of…

678

Features and functions overload

Margaret A. Hurley

Addresses the issue of the addition of features and functions to end‐user computer systems in an effort to increase the productivity of users. Argues that the core productive…

320

Trust in Web‐based electronic commerce security

Pauline Ratnasingham

Electronic commerce is about business. Businesses are built on relationships and relationships are built on trust, especially in today’s virtual competitive world. Trust is an…

2735

Information security awareness: educating your users effectively

M.E. Thomson, R. von Solms

This article investigates the evolution of computing, with specific reference to the security issues involved. These issues are then taken further to determine the need for…

8611

Information security management (1): why information security is so important

Rossouw von Solms

Information security has become very important in most organizations. The main reason for this is that access to information and the associated resources has become easier because…

6432

Internet security: a case study of firewall selection

H. Joseph Wen, Jyh‐Horng Michael Tarn

The Internet itself was not designed with security in mind. It was originally designed for research purposes, with open access to willing and able participants. Only recently…

2495
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid