Table of contents
Critical analysis of different approaches to minimizing user‐related faults in information systems security: implications for research and practice
Mikko T. SiponenEven though the human component has been recognized to have a crucial role in information systems (IS) security, the human issues have not received much attention. Recently a few…
“Need‐to‐know” principle and fuzzy security clearances modelling
Lech J. Janczewski, Victor PortougalThe paper discusses the assignment of security clearances to employees in a security conscious organisation. New approaches are suggested for solving two major problems. First…
Security‐related concerns with geographic information systems and geographic mapping
Karen A. ForchtGeographic information systems (GIS) makes use of geographic data, such as streets, store points, and block or neighborhood areas, and attribute data, such as population, income…
Disaster recovery planning: a strategy for data security
Steve M. Hawkins, David C. Yen, David C. ChouThe migration from centralized mainframe computers to distributed client/server systems has created a concern on data security. If a disaster occurs to the organization that…
Towards a “business‐led” approach to information systems development
Stuart MaguireThere is growing concern about the apparent widespread failure of information systems (IS) and information technology (IT) to deliver real organisational and business benefits…
Ethics and information technology use: a survey of US based SMEs
Sanjeev Phukan, Gurpreet DhillonThe purpose of this paper is to study the beliefs and attitudes of small‐ and medium‐sized enterprises (SMEs) toward the ethical use of information technology (IT). This research…
Issues with information dissemination on global networks
Michael TuregaThere is a need today for active documents on a global network which can react to their environment. The documents should be able to deal with all issues of presentation…