Search results

1 – 10 of 19
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 May 1993

Karen A. Forcht, Robert G. Brookshire, Scott P. Stevens and Rodney Clarke

Compares attitudes regarding the ethical use of computers insamples of business students from universities in the United States andAustralia. Finds that the two groups are…

468

Abstract

Compares attitudes regarding the ethical use of computers in samples of business students from universities in the United States and Australia. Finds that the two groups are statistically significantly different on 17 of the 26 ethics questions. Results show that significant differences in attitudes towards property and privacy issues exist; attitudes toward ethics in employee‐employer relations were not significantly different. In general, students in Australia tend to take ethical positions supporting greater freedom of action for computer users, while students in the United States take more restrictive positions.

Details

Information Management & Computer Security, vol. 1 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1997

Alicia Aldridge, Michele White and Karen Forcht

Looks at the growth and potential of the Internet in relation to security issues. Presently, lack of security is perceived as a major roadblock to doing business on‐line. Risks of…

3222

Abstract

Looks at the growth and potential of the Internet in relation to security issues. Presently, lack of security is perceived as a major roadblock to doing business on‐line. Risks of system corruption, fraud, theft and viruses point companies to the need for enhanced security. Investigates the importance of securing a company’s systems, its individual users, and its commercial transactions, and provides a checklist along with a brief discussion of available protection measures for these three primary security concerns.

Details

Internet Research, vol. 7 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Access Restricted. View access options
Article
Publication date: 1 September 1995

Karen A. Forcht and Richard E. Fore

Draws its topicality and relevance from the fact that not only isthe Internet widely publicized in all the media but also there are manystories regarding problems with its…

3816

Abstract

Draws its topicality and relevance from the fact that not only is the Internet widely publicized in all the media but also there are many stories regarding problems with its security. Provides a primer on the history, terminology, tools and common uses of the Internet. Identifies the most prevalent threats to security posed by using the Internet and discusses some of the traditional and emerging approaches to ensuring the security and integrity of data on the Internet.

Details

Internet Research, vol. 5 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1996

Ethan Sanderson and Karen A. Forcht

Presents a young person’s view of the threats and security measures to deal with sensitive information in today’s constantly changing technological environment. Promotes the…

4357

Abstract

Presents a young person’s view of the threats and security measures to deal with sensitive information in today’s constantly changing technological environment. Promotes the implementation of proactive security and warns of the problems caused by converging business markets and technologies. Discusses security policy, privacy, security logs, encryption, virus attacks, Internet concerns, firewalls and auditing. Outlines the work of the Computer Emergency Response Team and the Computer Incident Advisory Capability in the USA.

Details

Information Management & Computer Security, vol. 4 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 February 1998

Joan C. Hubbard and Karen A. Forcht

A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads itself to…

2345

Abstract

A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads itself to still other programs. Today’s society has seen a dramatic increase in the use of computers; as a result, businesses must take even more precautions to guard against the introduction of computer viruses into their systems.

Details

Industrial Management & Data Systems, vol. 98 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 1994

Karen A. Forcht and Morey Oare

Provides a strong basic definition of the Information Highway (IH),including security, hardware and software and discusses the futureramifications. Identifies the four main…

435

Abstract

Provides a strong basic definition of the Information Highway (IH), including security, hardware and software and discusses the future ramifications. Identifies the four main parties involved: cable companies, telephone companies, Internet and the policy‐makers in Washington, detailing their opinions and interests. Specifies a number of legislative issues involved and discusses the role of the Clinton administration. Finally, discusses the resulting business and economic implications.

Details

Information Management & Computer Security, vol. 2 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 2000

Karen A. Forcht

Geographic information systems (GIS) makes use of geographic data, such as streets, store points, and block or neighborhood areas, and attribute data, such as population, income…

971

Abstract

Geographic information systems (GIS) makes use of geographic data, such as streets, store points, and block or neighborhood areas, and attribute data, such as population, income levels, competition, and store sales, by integrating the two into a powerful spatial query. The techniques utilized include geographic mapping, digital mapping, aerial photographs, etc. Along with the convenience of using GIS, there are some concerns about privacy and security of the data and information. This paper addresses the security concerns related to this emerging technology.

Details

Information Management & Computer Security, vol. 8 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 December 1994

James R. Butler and Karen A. Forcht

The information explosion had led to the emergence of electronic crimeboth in the transfer of electronic funds and the gaining of information.Reports on the introduction of the…

353

Abstract

The information explosion had led to the emergence of electronic crime both in the transfer of electronic funds and the gaining of information. Reports on the introduction of the clipper chip to protect information and gives a discription of how it works, giving definitions of various terms. Examines a number of problems associated with the chip: trade; effectiveness; Constitutionality; reliability; necessity. Suggests places of contact for further investigation and information.

Details

Information Management & Computer Security, vol. 2 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 1 March 1998

Daphyne Saunders Thomas, Karen A. Forcht and Peter Counts

With an estimated over 40 million Internet users all over the world, things that once happened only in “real life” are starting to occur in this virtual world. This Internet, just…

1714

Abstract

With an estimated over 40 million Internet users all over the world, things that once happened only in “real life” are starting to occur in this virtual world. This Internet, just like the physical world, cannot rely on laws alone to keep order. The rules that regulate behavior, the policies for what is acceptable and the laws that pertain to activities have developed and will continue to emerge over time. However, conflicts of interest are inevitable and wherever conflict occurs, the government will regulate on matters including e‐mail, data theft, piracy, search and seizure, electronic banking, offensive behavior, and other legal liability issues.

Details

Internet Research, vol. 8 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Access Restricted. View access options
Article
Publication date: 1 October 1994

Karen A. Forcht and Joan Pierson

Looks at the wide‐ranging changes which are taking place in the computerindustry and what this means for security issues. Highlights currentcomputer crimes and looks at why…

1694

Abstract

Looks at the wide‐ranging changes which are taking place in the computer industry and what this means for security issues. Highlights current computer crimes and looks at why computer crime has been able to increase, e.g. computer terrorism, sale of contaminated software, and why today there is a greater need for computer security. Refers to the Berne Convention and the “gold card proposal”. Discusses the attitudes for and against trans‐border data flow, and the now very public issue of privacy, including how the buying of information is being tackled and the consequences of the cashless society.

Details

Industrial Management & Data Systems, vol. 94 no. 8
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 10 of 19
Per page
102050