Table of contents
Data integrity and the Internet:: implications for management
Richard G. Mathieu, Robert L. WoodardThe Internet is increasingly used by management professionals tosupport information gathering and research activities. However, thedifferent sources of information on the Internet…
Information security baselines
Kevin J. FitzgeraldDescribes a set of “baseline” threats and presents thereasoning behind the “baseline” security approach. Discussesan example of the acceptance of the security baseline approach…
Legal control of computer crime in Hong Kong
Matthew K. O. LeeOne of the main aims of information systems security (ISS) is toprevent unauthorized access to and tampering with information systemsresources. In April 1993 the first ever…
Promoting security awareness and commitment
Phil SpurlingSees security awareness promotion as part of the overallorganization – its culture, philosophy and vision. Presents a casestudy of a major Australian organization. Traces the…
Erratum
This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/01443579410056074. When citing the…
The utility of information systems views of CEOs and information system executives
Mahmoud M. Yasin, John V. QuigleyExamines the views of 25 chief executive officers and theirinformation systems executives on the utility of information systems intheir organizations. Detects a gap between these…