Table of contents
Rejuvenating the IT supply organization
Han. T.M. van der ZeeCompelled by every increasing competition, newly opening markets, globalization, deregulation channels and joint ventures. Information technology (IT) is increasingly taking on a…
Internet computer virus protection policy
H. Joseph WenOrganizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this paper is to…
The evaluation and certification of information security against BS 7799
Lynette Barnard, Rossouw von SolmsElectronic commerce has become a reality, but unfortunately it is held back by the lack of information security associated with it. Business partners will have to prove to each…
1997 computer crime and security survey
David ThompsonDescribes how the Office of Strategic Crime Assessments (OSCA) and the Victoria Police Computer Crime Investigation Squad conducted the 1997 Computer Crime and Security Survey in…