Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-10 of 10
Keywords: Computer Security
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Cyberspace security management
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1999) 99 (8): 353–361.
Published: 01 December 1999
... applies to high‐volume financial transactions. Internet Computer security Encryption physical security controls; personnel security controls; administrative security controls; data communications security controls; computer security controls; disaster recovery and backup...
Journal Articles
Computer viruses: how companies can protect their systems
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1998) 98 (1): 12–16.
Published: 01 February 1998
... conducted by the National Computer Security Association (NCSA) (Anthes, 1996) and Dataquest found that 65 percent of all viruses are transmitted through floppy disks (Mangelsdorf, 1995). This transmission is especially dangerous in the networked business environment because one virus can ostensibly...
Journal Articles
Inadequate security encourages the thief
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1995) 95 (2): 3–5.
Published: 01 March 1995
...Alan Mills Reviews the findings of the Audit Commission′s fifth triennial report on computer fraud and abuse, published in October 1994. This shows that, while computer fraud and abuse is a growth industry, many organizations do not seem to take computer security seriously. Also considers a survey...
Journal Articles
New Technologies and Future Trends in Computer Security
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1994) 94 (8): 30–36.
Published: 01 October 1994
... software, and why today there is a greater need for computer security. Refers to the Berne Convention and the “gold card proposal”. Discusses the attitudes for and against trans‐border data flow, and the now very public issue of privacy, including how the buying of information is being tackled...
Journal Articles
Software Management and Accountability
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1992) 92 (4): 13–15.
Published: 01 April 1992
... of software? © MCB UP Limited 1992 Computer security Computer software Copyright Data protection SOFTWARE MANAGEMENT AND ACCOUNTABILITY 13 C ombating illegal copying of software is not easy. Some practical advice is given. Software Management and Accountability Len Williams Industrial...
Journal Articles
Personal Data: The Act Begins to Bite
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1990) 90 (1): 11–14.
Published: 01 January 1990
... of the Act is described and examples of the kinds of cases brought to the Registrar′s attention are given. The changes which could be made to the Data Protection Act to improve it for the future are also discussed. © MCB UP Limited 1990 Information systems Computer privacy Computer security...
Journal Articles
Computer Crime
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1987) 87 (7-8): 28–31.
Published: 01 July 1987
... with their possible solutions. Computers Computer Security Computer Crime Recorded cases of system penetration have nearly doubled in the last three years according to a survey on computer crime published by BIS Applied Systems. In an analysis of over 140 crimes documented in the Computer Crime Casebook...
Journal Articles
Multi‐user Systems: Network or Central Processor?
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1986) 86 (7-8): 16–17.
Published: 01 July 1986
... that a shared processor system offering true multi‐user, multi‐tasking facilities provides a more robust approach than that of networking microcomputers for normal business applications. © MCB UP Limited 1986 Computer Networks Computer Security Multi-user Systems: Network or Central Processor...
Journal Articles
The Management Role in Protecting Corporate Data Resources
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1986) 86 (5-6): 16–17.
Published: 01 May 1986
... of computer security may well bring the company into conflict with the law. © MCB UP Limited 1986 Computer Security Data Protection Act Management Control The Management Role in Protecting Corporate Data Resources by Roy Carter Business Author Few people would disagree that the possession...
Journal Articles
The Automated Office and Computer Crime: A Preliminary Assessment
Available to Purchase
Journal:
Industrial Management & Data Systems
Industrial Management & Data Systems (1986) 86 (1-2): 14–19.
Published: 01 January 1986
... administration within Computer Security Crime Office Automation © MCB UP Limited 1986 The Automated Office and Computer Crime: A Preliminary Assessment by Clive Blatchford International Computers Ltd, London Introduction A computer (related) crime is defined as a crime which either directly...
