Table of contents
Attitudes of Australian information system managers against online attackers
William Hutchinson, Matthew WarrenExamines the attitudes of Australian IS/IT managers to the concept of cyber‐vigilantism. Also, it explores the policies and procedures which have been set in place by various…
Integrating security design into the software development process for e‐commerce systems
M.T. Chan, L.F. KwokDevelopment of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance…
Say goodbye to the CIO, welcome to the business prophet
Nolan Norton InstituteAs part of its ongoing CIO Forum Series, the Nolan Norton Institute in Australia undertakes in‐depth interviews, discussions and research with senior IT management across the…
A framework for access control in workflow systems
Reinhardt A. Botha, Jan H.P. EloffWorkflow systems are often associated with business process re‐engineering (BPR). This paper argues that the functional access control requirements in workflow systems are rooted…
Mobile computer systems – security considerations
M.A. BadamasThe number of workers using computers away from the office is increasing, particularly for engineers, accountants, salesmen and consultants, and those called nomadic users. The…