Table of contents
A Security Framework for Information Systems Outsourcing
Dieter FinkThe business benefits that can be achieved have dominated theconsiderations as to whether or not to outsource information systems(IS). Very little attention appears to have been…
Establishing Security in a Multi‐platform, Multi‐vendor Enterprise‐wide IT Environment
Kevin J. FitzgeraldEstablishing information security in a downsized multi‐platform,multi‐vendor, enterprise‐wide information technology environment isemerging as the greatest challenge yet to…
Organisational Transformation and Alignment: Misalignment as an Impediment to Progress in Organisational Development
K. Hugh MacdonaldThe business environment is turbulent, with the degree and frequency ofchange seemingly increasing but action to anticipate and prepare forturbulence being less evident. Outlines…
Censorship on the Information Highway
Geoffrey Ebbs, Howard RheingoldProvides summaries of the arguments of two contributors to TheAustralian debating the case for and against censorship on the Internetnetwork.
Software Auditing Means Better Business
Philip BernerIf a company′s software is seized because it has not been legitimatelyacquired, that company′s business records including business planning,financial records and new business…
Security and Network Management: Changes in the Way We Work
Karen A. Forcht, Yuan‐Wen Aven TsaiOutsourcing Local Area Network (LAN) administration is rapidly gainingground but, since many LANs are connected, virtually all users have atleast limited access to information…