Table of contents
Watching systems in action: security at the periphery
Fritz H. Grupe, James M. Hensley, Jeanne H. YamamuraComputer security is maintained in many ways. New systems are developed with an eye towards protecting against known techniques for bypassing system controls. New methods of…
Features and functions overload
Margaret A. HurleyAddresses the issue of the addition of features and functions to end‐user computer systems in an effort to increase the productivity of users. Argues that the core productive…
Trust in Web‐based electronic commerce security
Pauline RatnasinghamElectronic commerce is about business. Businesses are built on relationships and relationships are built on trust, especially in today’s virtual competitive world. Trust is an…
Information security awareness: educating your users effectively
M.E. Thomson, R. von SolmsThis article investigates the evolution of computing, with specific reference to the security issues involved. These issues are then taken further to determine the need for…
Information security management (1): why information security is so important
Rossouw von SolmsInformation security has become very important in most organizations. The main reason for this is that access to information and the associated resources has become easier because…
Internet security: a case study of firewall selection
H. Joseph Wen, Jyh‐Horng Michael TarnThe Internet itself was not designed with security in mind. It was originally designed for research purposes, with open access to willing and able participants. Only recently…