Table of contents
Accelerating executive development: hey coach…
Susan Cramm, Thornton MayDescribes the requirement for chief information officers, in particular among senior business management, to maintain a high level of credibility and rapport with business peers…
Achieving IT success
Douglas Brockway, Margaret HurleyPostulates that there are identifiable and measurable criteria for achieving success in the management of information technology and discusses these criteria. Presents hypotheses…
Industrial information‐weight security models
V. Portougal, Lech J. JanczewskiThe paper discusses a set of models which can assist in developing security profiles of objects and subjects operating within industrial or commercial organisations’ databases. In…
Real‐time risk analysis using Java concepts
L. Labuschagne, J.H.P. EloffUsing new concepts, such as those on which Java is based, it is now possible to define a new framework within which risk analyses can be performed on electronic communications. In…
Some limitations of web of trust models
Stephen WilsonThe “web of trust” is one approach to the problem of trusted exchange of public keys in a public key security system. In a web of trust, individuals accept the bulk of the…
Information security management (2): guidelines to the management of information technology security (GMITS)
Rossouw von SolmsInformation security has become very important in most organizations. To introduce, manage and maintain a high level of information security in an organization calls for a proper…
Information security management (3): the Code of Practice for Information Security Management (BS 7799)
Rossouw von SolmsInformation security has become very important in most organizations. An acceptable level of information security can only be introduced and maintained if the correct set of…