Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Collaring the Computer Criminal An Analysis of Information Security for Network Computing

Collaring the Computer Criminal An Analysis of Information Security for Network Computing Recent shifts from mainframes to networking technologies have givenbusiness the ability to meet challenges in the competitive markets withaccurate, timely data distribution. Meanwhile, the blossoming of datacommunication has created the potential thorns of computer crimes. Thisarticle discusses the impact of networking technology on the businessenvironment, identifies various types of computer misconduct, andpresents measures for prevention. The article concludes by enumeratingvarious issues involved in effectively sanctioning computer crimes. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Managerial Auditing Journal Emerald Publishing

Collaring the Computer Criminal An Analysis of Information Security for Network Computing

Managerial Auditing Journal , Volume 6 (3) – Mar 1, 1991

Loading next page...
 
/lp/emerald-publishing/collaring-the-computer-criminal-an-analysis-of-information-security-65Fjf2bpY9
Publisher
Emerald Publishing
Copyright
Copyright © Emerald Group Publishing Limited
ISSN
0268-6902
DOI
10.1108/02686909110000116
Publisher site
See Article on Publisher Site

Abstract

Recent shifts from mainframes to networking technologies have givenbusiness the ability to meet challenges in the competitive markets withaccurate, timely data distribution. Meanwhile, the blossoming of datacommunication has created the potential thorns of computer crimes. Thisarticle discusses the impact of networking technology on the businessenvironment, identifies various types of computer misconduct, andpresents measures for prevention. The article concludes by enumeratingvarious issues involved in effectively sanctioning computer crimes.

Journal

Managerial Auditing JournalEmerald Publishing

Published: Mar 1, 1991

References