Table of contents
A profile of the information technology executive
Liz Coghlan, Margaret HurleyDescribes a survey, undertaken by the Nolan Norton Institute in mid‐1995, of Australia’s senior IT (information technology) ranks. The objective of the survey was to gain a better…
A consensus ranking for information system requirements
Yong Shi, Pamela Specht, Justin StolenIn allocating scarce resources to a new information system (IS), a non‐trivial task becomes the determination of a best priority ranking of the IS’s intangible information…
A business approach to effective information technology risk analysis and management
Sharon Halliday, Karin Badenhorst, Rossouw von SolmsSuggests that a number of difficulties are experienced by organizations using conventional risk analysis and management. “Conventional” refers to those methodologies which are…
Information security in business environments
Ethan Sanderson, Karen A. ForchtPresents a young person’s view of the threats and security measures to deal with sensitive information in today’s constantly changing technological environment. Promotes the…
Extinguishing halons
Greg DoddrellDiscusses the effectiveness and appropriateness of gas flooding systems to control fire in computer rooms. Explains the workings of such systems, detailing their components and…
Constructing difficult‐to‐guess passwords
Charles Cresson WoodPasswords have a convenience which other access controls do not. However, they must be made more effective through difficult‐to‐guess, easy‐to‐remember techniques, supported by…
Knowledge technologies and business alignment
Douglas W. BrockwayAchieving lasting, profitable growth is often a matter of maintaining “alignment”. Companies need to ensure that their strategy, organization, processes, culture and systems…
Commercial security on the Internet
Carrie LiddyThere is a growing trend to delivering more efficient and more effective products and services with fewer and fewer resources. This trend is reflected in both the commercial and…