Table of contents
Risk Analysis: Ten Years On
Kevin J. FitzgeraldThe need for security for the business user is all important thesedays especially as the trend is to distribute computing power in theuser environment. Examines risk analysis of…
Computer Ethics of University Students: An International Exploratory Study
Karen A. Forcht, Robert G. Brookshire, Scott P. Stevens, Rodney ClarkeCompares attitudes regarding the ethical use of computers insamples of business students from universities in the United States andAustralia. Finds that the two groups are…
Legal Aspects of the Human Genome Project: Reflections on the Bilbao Conference
Justice Michael KirbyReports on the International Workshop on Legal Aspects of the HumanGenome Project, held in Bilbao, Spain, on 24‐26 May 1993, and attendedby leading scientists, administrators…
The Human Genome Project: Promise or Problems?
Justice Michael KirbyDiscusses the Human Genome Project, which aims to map the structureand function of approximately 100,000 genes in the human body. Describessome of the ethical and legal problems…
Dreams Come True with Password Genie
Charles Cresson WoodSuggests that computer passwords can pose a major computer securityrisk, as password guessing is the most prevalent and effective method ofsystem penetration. Introduces a new…