Table of contents
Corporate system security: towards an integrated management approach
Huong Ngo HigginsThis paper discusses an integrated security approach that engages multiple functional levels in an organization from the Board and management to IT staff and individual users. The…
Identifying the proceeds of electronic money fraud
David KreltszheimeCash by DigiCash is one of a range of software‐based systems devised for payments to be made over the Internet by the use of electronic tokens or “coins” (known colloquially as…
IT contingency planning: management roles
Ernest JordanThis paper presents an analysis of selected participants in a survey of Australian organisations’ approaches to business and information technology (IT) contingency planning. In…
Copyright protection in the digital age
Carolyn OddieThe global generation and the use of digital information over online networks has massive implications for copyright management, a situation for which few countries are well…
Privacy and security on the Internet: how to secure your personal information and company data
Mohsen Attaran, Ilja VanLaarMore and more people are logging on to the Internet. The increased use of the Internet and the World Wide Web for everyday activities is bringing new threats to personal privacy…
Towards the integrated monitoring and evaluation system IMES: a real power
John K. Psarras, Athanassios P. Papakonstantinou, Kostas S. MetaxiotisWithin the last decade many projects have been implemented in order to provide technical assistance (TA) to countries which have initiated their transition from centrally planned…
A distributed component framework for integrated network and systems management
M. Knahl, H.D. Hofmann, A. PhippenIt is proposed that future work should move on from existing network and system management methodologies to consider enhancing the management methodology for ATM and other…