Table of contents
Commercialization of cryptography
Carrie LiddyPresents the major approaches for achieving commercial security on the Internet, public key and key escrow. Discusses the implications of (US) legislation putting limitations on…
The death of ROI: re‐thinking IT value measurement
Thornton A. MayPresents the case that traditional return on investment (ROI) as an approach for justifying and measuring the value of IT investments is no longer appropriate. Argues that…
Managing information resources and environmental turbulence
Zeinab A. KarakeUsing a sample of large industrial firms from two industries with differing external turbulence ‐ commercial banking and pharmaceutical ‐ hypothesizes that the need for a senior…
Securely handling staff terminations
Charles Cresson WoodDiscusses risks to organizational computer security following staff termination and provides anecdotal evidence of what can go wrong. Suggests a policy for dealing with computer…
Improving security in computational electronic mail systems
Schubert Foo, Peng Chor Leong, Yee Nam SngPosits that computational electronic mail is essentially traditional electronic mail messages with embedded programs or interpretable scripts. States, at the recipient’s end, the…
Government initiatives in information technology security
Steve OrlowskiExamines the balance between privacy and law enforcement and initiatives from central governments to retain control. Describes the computer security tools available and discusses…