Skip to Main Content
Keywords: Computer systems
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Management & Computer Security (1998) 6 (3): 138–144.
Published: 01 August 1998
..., in non‐technical terms, the basic concepts of the application of fuzzy logic modelling to risk analysis. © MCB UP Limited 1998 Computer systems Fuzzy logics Information systems Risk management The traditional approach to performing a risk analysis is to adhere to the following...
Journal Articles
Information Management & Computer Security (1998) 6 (2): 78–101.
Published: 01 May 1998
... in Australia today. A representative sample of over 300 Australian companies was surveyed. Of the respondents, 37 per cent had experienced some form of intrusion or other unauthorised use of computer systems in the last 12 months. Nearly 90 per cent of those that had experienced computer‐related incidents had...
Journal Articles
Information Management & Computer Security (1995) 3 (1): 21–27.
Published: 01 March 1995
... costs by breaking down the test procedure into components, modules and full tests. © MCB UP Limited 1995 Check sheets Computer systems Disaster management Disaster recovery Documentation Team leaders Tests For an increasing number of organizations, the loss of their computer...

or Create an Account

Close Modal
Close Modal