Information Management & Computer Security: Volume 9 Issue 3

Subjects:

Table of contents

Attitudes of Australian information system managers against online attackers

William Hutchinson, Matthew Warren

Examines the attitudes of Australian IS/IT managers to the concept of cyber‐vigilantism. Also, it explores the policies and procedures which have been set in place by various…

Integrating security design into the software development process for e‐commerce systems

M.T. Chan, L.F. Kwok

Development of Web‐based e‐commerce systems has posed challenges in different dimensions of the software development process including design, maintenance and performance…

5060

Say goodbye to the CIO, welcome to the business prophet

Nolan Norton Institute

As part of its ongoing CIO Forum Series, the Nolan Norton Institute in Australia undertakes in‐depth interviews, discussions and research with senior IT management across the…

897

A framework for access control in workflow systems

Reinhardt A. Botha, Jan H.P. Eloff

Workflow systems are often associated with business process re‐engineering (BPR). This paper argues that the functional access control requirements in workflow systems are rooted…

1220

Mobile computer systems – security considerations

M.A. Badamas

The number of workers using computers away from the office is increasing, particularly for engineers, accountants, salesmen and consultants, and those called nomadic users. The…

1886
Cover of Information Management & Computer Security

ISSN:

0968-5227

Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid