Within the last year
Within the past 3 years
1 - 9 of 9 articles
Distinguishes between confidentiality and privacy of information held on individuals, the latter by companies, but doubts that privacy, where applicable, is respected by many companies in view of the cumulative value of such information as a power asset. Details recent legislation covering the...
The thrust of management information system (MIS) operations is to keep an information system running smoothly and to ensure services are delivered in an uninterrupted, reliable and secure fashion. This poses a special challenge in today′s environment of computer misuses. Focuses on four main...
Explains the importance of the risk management function as part of the disaster recovery‐planning process. Explains what you can and cannot insure and the importance of not underestimating the “indemnity period”. Explains methods of establishing the “sum insured”, along with the...
Organizations need to have undertaken an analysis of business risk and to have formulated a recovery plan. However, only a small number of businesses have made any attempt to minimize their risks and even fewer have a recovery plan which has been tested. Most are a token gesture to auditors. An...
Computer fraud, Law, Procedures, Punishment, USA Outlines in chart format the definitions, prohibitions, procedures and punishments of computer crime laws in the USA.
Deals with the dangers to computer systems from flooding and water‐related hazards which so far appear to have been underestimated, and offers preventive and remedial advice to companies which may find themselves in such a position.
Describes a fifth‐operation software tool which is a powerful network manager that guards systems from intrusion and provides an accurate system asset register.
Following recent London bomb attacks, examines the effectiveness of disaster recovery plans and the services that were available to assist recovery. Also explores the mid‐ and long‐term effects of the disaster on some of the organizations which survived the bombings. Or did they?.
Outlines plans and products of Software Intelligence′s new division AXENT Technologies which will concentrate on information security solutions for client/server computers.
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.