Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-11 of 11
Keywords: Computers
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
A long‐term trial of alternative user authentication technologies
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (2): 178–190.
Published: 01 April 2004
... would be able to recall them with sufficient accuracy. © Emerald Group Publishing Limited 2004 Computers User interfaces System monitoring Systems monitoring User studies which, if any, of the trialed techniques could replace existing ones; the subjects' perceived user...
Journal Articles
Embedding privacy in IT applications development
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (1): 8–26.
Published: 01 February 2004
... should be protected against unauthorized use. © Emerald Group Publishing Limited 2004 Privacy Computers Data security Privacy‐enhancing technologies (PET) is a collective term used to refer to various competing technologies that have been developed to help users protect...
Journal Articles
A new two‐tiered strategy to intrusion detection
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (1): 27–44.
Published: 01 February 2004
... anomalies and raises an alarm. The evaluation of the intrusion detection system design was carried out to justify the importance of the work. Data security Computers Data analysis Systems analysis Let {U1,U2,…,Un} be the set of users in system S. Let...
Journal Articles
Intrusion detection: methods and systems. Part II
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (5): 222–229.
Published: 01 December 2003
...Joseph S. Sherif; Rod Ayers This paper is part II of a previous article of the same title: Intrusion detection. Part II is concerned with intrusion threats, attacks, defense, models, methods and systems. Operating systems Computers Risk management Information disclosure Enterasys...
Journal Articles
A holistic model of computer abuse within organizations
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2002) 10 (2): 57–63.
Published: 01 May 2002
...Jintae Lee; Younghwa Lee Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization...
Journal Articles
National (UK) Computer Security Survey 1996
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1996) 4 (3): 3–17.
Published: 01 August 1996
...Brian Kearvell‐White Presents the UK survey of 15,000 finance directors in the UK and Ireland with annual turnovers of £10 million or more. States that the objective was to gain information about attitudes towards computer security and measures taken to secure information. Contains five headings...
Journal Articles
Information security and the Internet
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1995) 3 (4): 15–19.
Published: 01 October 1995
.... Illustrates a range of best practice firewalls and includes a collection of recent press clippings to give weight and interest to the discussion. © MCB UP Limited 1995 A scene of devastation? No. All the computers are in their rightful places, the filing cabinets are still locked and the lunch room...
Journal Articles
New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1994) 2 (3): 43–45.
Published: 01 August 1994
...”. Computers Crime Encryption Privacy Security Expensive, flawed technology is being aggressively proposed by the US administration which may permanently erode personal privacy and will not accomplish its stated goal. It is generically referred to as the Clipper chip. The Clipper chip...
Journal Articles
Computer Usage and Job Satisfaction: An Empirical Exploration
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1994) 2 (2): 10–22.
Published: 01 May 1994
...Rachid Zeffane On the basis of a survey of 1,300 employees from the Australian telecommunications industry, examines the impact of computer usage on job satisfaction. Results reveal that job satisfaction is positively influenced by the extent of computer usage, aspects of computer‐related training...
Journal Articles
Computer Ethics of University Students: An International Exploratory Study
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1993) 1 (5)
Published: 01 May 1993
...Karen A. Forcht; Robert G. Brookshire; Scott P. Stevens; Rodney Clarke Compares attitudes regarding the ethical use of computers in samples of business students from universities in the United States and Australia. Finds that the two groups are statistically significantly different on 17 of the 26...
Journal Articles
Computing Environment in an Arabian Gulf Country: An Organizational Perspective
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (1993) 1 (1): 11–18.
Published: 01 January 1993
...Ugur Yavas; Mahmoud Yasin Examines the computing environment in Saudi Arabia. Studies trichotomy of Saudi organizations. After profiling these organizations,investigating reasons behind their computerization and determining their future computerization plans, the study offers pointers for action...
