Table of contents
A holistic model of computer abuse within organizations
Jintae Lee, Younghwa LeePast studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in…
Application service providers (ASP): moving downstream to enhance competitive advantage
Alan D. Smith, William T. RuppThe application service provider (ASP) industry is a fairly young entry into the IT and automatic identification and data capture industries. There are various types of ASPs: EASP…
Auditing disclosure risks of on‐line broker‐dealers
Huong Ngo HigginsThis paper discusses disclosures required of on‐line broker‐dealers, and recommends various internal measures that on‐line broker‐dealers should take to comply with securities…
Protecting personal privacy on the Internet
S.E. Kruck, Danny Gottovi, Farideh Moghadami, Ralph Broom, Karen A. ForchtThe rapid advance of technology has permitted the creation of vast amounts of information, both on and off the Internet. The public is only just beginning to realize how this…
Quality of service – technology and implementation
Someswar Kesh, Sridhar Nerur, Sam RamanujanThis paper discusses various facets of quality of service (QOS), a technology that allows network managers to prioritize data to optimize bandwidth use and maintain data quality…