Table of contents
An experimental comparison of secret‐based user authentication technologies
I. Irakleous, S.M. Furnell, P.S. Dowland, M. PapadakiThe paper presents a comparative study of software‐based user authentication techniques, contrasting the use of traditional password and personal identifier numbers (PIN) against…
Information management of automatic data capture: an overview of technical developments
Alan D. Smith, Felix OffodileAutomatic identification and data capture/collection (AIDC) systems are one of the most widely used and under‐recognized IT strategic assets in use in the global economy. Data…
The information security management toolbox – taking the pain out of security management
Clive Vermeulen, Rossouw Von SolmsBecause of changes that have taken place in the way that IT is used in organisations, as well as the purposes for which it is used, traditional forms of computer security are no…
Identifying risks during information system development: managing the process
Stuart MaguireDevelopments in information and communications technology have allowed many organisations to implement systems that directly link to customers and suppliers. In a number of…
System insecurity – firewalls
Mayur S. Desai, Thomas C. Richards, Thomas von der EmbseThe firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from…