Within the last year
Within the past 3 years
1 - 7 of 7 articles
Even though the human component has been recognized to have a crucial role in information systems (IS) security, the human issues have not received much attention. Recently a few approaches aimed at minimizing human-related faults in the area of IS security have been put forward. This paper...
The purpose of this paper is to study the beliefs and attitudes of small- and medium-sized enterprises (SMEs) toward the ethical use of information technology (IT). This research in progress paper presents findings from an "ethics survey" conducted in the USA. The initial data presented here...
Geographic information systems (GIS) makes use of geographic data, such as streets, store points, and block or neighborhood areas, and attribute data, such as population, income levels, competition, and store sales, by integrating the two into a powerful spatial query. The techniques utilized...
There is growing concern about the apparent widespread failure of information systems (IS) and information technology (IT) to deliver real organisational and business benefits. Several high profile computer system failures in the public domain have highlighted this problem. A lack of...
The migration from centralized mainframe computers to distributed client/server systems has created a concern on data security. If a disaster occurs to the organization that destroys a server or the entire network, a company may not be able to recover from the loss. Developing an effective...
The paper discusses the assignment of security clearances to employees in a security conscious organisation. New approaches are suggested for solving two major problems. First, full implementation of the "need-to-know" principle is provided by the introduction of data access statements (DAS) as...
There is a need today for active documents on a global network which can react to their environment. The documents should be able to deal with all issues of presentation, interpretation and security. They should be capable of presenting information in a way suitable for a particular user or...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.