Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-10 of 10
Keywords: Australia
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
How well are information risks being communicated to your computer end‐users?
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (5): 362–371.
Published: 16 October 2007
... environment. Research limitations/implications The research subjects (i.e. survey participants) for both pilot studies were students of the University of South Australia. There are many ways in which information risk communication could be made more effective and this paper only attempts to show how...
Journal Articles
Privacy management – a new era in the Australian business environment
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (2): 60–66.
Published: 01 May 2003
... in Australia in particular. It further discusses IT‐centric measures that need to be undertaken for the purposes of compliance of the Act and provides an overview of enabling technology currently available. Findings from various market research conducted (GVU Tenth WWW User Survey, 1998; Forrester Research...
Journal Articles
IT contingency planning: management roles
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1999) 7 (5): 232–238.
Published: 01 December 1999
..., especially in those organisations that have specified that IT is critical to the business operations. The survey was undertaken because there was a perception that coping with disaster is a much‐neglected aspect of management in Australia, and this analysis examines the underlying attitudes. The findings...
Journal Articles
1997 computer crime and security survey
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1998) 6 (2): 78–101.
Published: 01 May 1998
... in Australia today. A representative sample of over 300 Australian companies was surveyed. Of the respondents, 37 per cent had experienced some form of intrusion or other unauthorised use of computer systems in the last 12 months. Nearly 90 per cent of those that had experienced computer‐related incidents had...
Journal Articles
Telecommunications deregulation: an Australian perspective
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (3): 39–41.
Published: 01 August 1996
... a need for more information about their customers, in an appropriate format, of an appropriate type, and delivered at the appropriate time. This requirement has already driven the growth of the data warehouse industry in the USA and will no doubt also do so in Australia. The following technical...
Journal Articles
A profile of the information technology executive
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (1): 5–9.
Published: 01 March 1996
...Liz Coghlan; Margaret Hurley Describes a survey, undertaken by the Nolan Norton Institute in mid‐1995, of Australia’s senior IT (information technology) ranks. The objective of the survey was to gain a better understanding of the continent’s senior IT executives. The results show a grim reality...
Journal Articles
What if you had a flood in your computer room
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (1): 38–40.
Published: 01 March 1995
...Kevin J. Fitzgerald Deals with the dangers to computer systems from flooding and water‐related hazards which so far appear to have been underestimated,and offers preventive and remedial advice to companies which may find themselves in such a position. © MCB UP Limited 1995 Australia...
Journal Articles
Computer Usage and Job Satisfaction: An Empirical Exploration
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1994) 2 (2): 10–22.
Published: 01 May 1994
.... The results illuminate some of the human resource and training issues and challenges that organizations engaged in extensive computerization may need to address. Australia Computer users Computers Job satisfaction Training The potential impact of computer usage on job attitudes remains an area...
Journal Articles
Computer Ethics of University Students: An International Exploratory Study
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1993) 1 (5)
Published: 01 May 1993
...Karen A. Forcht; Robert G. Brookshire; Scott P. Stevens; Rodney Clarke Compares attitudes regarding the ethical use of computers in samples of business students from universities in the United States and Australia. Finds that the two groups are statistically significantly different on 17 of the 26...
Journal Articles
The 1992 Profile of Computer Abuse in Australia: Part 2
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1993) 1 (2)
Published: 01 February 1993
...Vic Kamay; Tony Adams Analyses some of the 497 cases of computer abuse recorded by the Australian Computer Abuse Research Bureau, since its inception in 1978. Features include perpetrators and the law, and computer abuse by industry. THE 1992 PROFILE OF COMPUTER ABUSE IN AUSTRALIA: PART 2 21...
