Skip to Main Content
Keywords: Computers
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Management & Computer Security (2004) 12 (2): 178–190.
Published: 01 April 2004
... would be able to recall them with sufficient accuracy. © Emerald Group Publishing Limited 2004 Computers User interfaces System monitoring Systems monitoring User studies which, if any, of the trialed techniques could replace existing ones; the subjects' perceived user...
Journal Articles
Information Management & Computer Security (2004) 12 (1): 8–26.
Published: 01 February 2004
... should be protected against unauthorized use. © Emerald Group Publishing Limited 2004 Privacy Computers Data security Privacy‐enhancing technologies (PET) is a collective term used to refer to various competing technologies that have been developed to help users protect...
Journal Articles
Information Management & Computer Security (2004) 12 (1): 27–44.
Published: 01 February 2004
... anomalies and raises an alarm. The evaluation of the intrusion detection system design was carried out to justify the importance of the work. Data security Computers Data analysis Systems analysis Let {U1,U2,…,Un} be the set of users in system S. Let...
Journal Articles
Information Management & Computer Security (2003) 11 (5): 222–229.
Published: 01 December 2003
...Joseph S. Sherif; Rod Ayers This paper is part II of a previous article of the same title: Intrusion detection. Part II is concerned with intrusion threats, attacks, defense, models, methods and systems. Operating systems Computers Risk management Information disclosure Enterasys...
Journal Articles
Information Management & Computer Security (2002) 10 (2): 57–63.
Published: 01 May 2002
...Jintae Lee; Younghwa Lee Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization...
Journal Articles
Information Management & Computer Security (1996) 4 (3): 3–17.
Published: 01 August 1996
...Brian Kearvell‐White Presents the UK survey of 15,000 finance directors in the UK and Ireland with annual turnovers of £10 million or more. States that the objective was to gain information about attitudes towards computer security and measures taken to secure information. Contains five headings...
Journal Articles
Information Management & Computer Security (1995) 3 (4): 15–19.
Published: 01 October 1995
.... Illustrates a range of best practice firewalls and includes a collection of recent press clippings to give weight and interest to the discussion. © MCB UP Limited 1995 A scene of devastation? No. All the computers are in their rightful places, the filing cabinets are still locked and the lunch room...
Journal Articles
Information Management & Computer Security (1994) 2 (3): 43–45.
Published: 01 August 1994
...”. Computers Crime Encryption Privacy Security Expensive, flawed technology is being aggressively proposed by the US administration which may permanently erode personal privacy and will not accomplish its stated goal. It is generically referred to as the Clipper chip. The Clipper chip...
Journal Articles
Information Management & Computer Security (1994) 2 (2): 10–22.
Published: 01 May 1994
...Rachid Zeffane On the basis of a survey of 1,300 employees from the Australian telecommunications industry, examines the impact of computer usage on job satisfaction. Results reveal that job satisfaction is positively influenced by the extent of computer usage, aspects of computer‐related training...
Journal Articles
Information Management & Computer Security (1993) 1 (5)
Published: 01 May 1993
...Karen A. Forcht; Robert G. Brookshire; Scott P. Stevens; Rodney Clarke Compares attitudes regarding the ethical use of computers in samples of business students from universities in the United States and Australia. Finds that the two groups are statistically significantly different on 17 of the 26...
Journal Articles
Information Management & Computer Security (1993) 1 (1): 11–18.
Published: 01 January 1993
...Ugur Yavas; Mahmoud Yasin Examines the computing environment in Saudi Arabia. Studies trichotomy of Saudi organizations. After profiling these organizations,investigating reasons behind their computerization and determining their future computerization plans, the study offers pointers for action...

or Create an Account

Close Modal
Close Modal