Karen A. Forcht, Robert G. Brookshire, Scott P. Stevens and Rodney Clarke
Compares attitudes regarding the ethical use of computers insamples of business students from universities in the United States andAustralia. Finds that the two groups are…
Abstract
Compares attitudes regarding the ethical use of computers in samples of business students from universities in the United States and Australia. Finds that the two groups are statistically significantly different on 17 of the 26 ethics questions. Results show that significant differences in attitudes towards property and privacy issues exist; attitudes toward ethics in employee‐employer relations were not significantly different. In general, students in Australia tend to take ethical positions supporting greater freedom of action for computer users, while students in the United States take more restrictive positions.
Details
Keywords
Alicia Aldridge, Michele White and Karen Forcht
Looks at the growth and potential of the Internet in relation to security issues. Presently, lack of security is perceived as a major roadblock to doing business on‐line. Risks of…
Abstract
Looks at the growth and potential of the Internet in relation to security issues. Presently, lack of security is perceived as a major roadblock to doing business on‐line. Risks of system corruption, fraud, theft and viruses point companies to the need for enhanced security. Investigates the importance of securing a company’s systems, its individual users, and its commercial transactions, and provides a checklist along with a brief discussion of available protection measures for these three primary security concerns.
Details
Keywords
Karen A. Forcht and Richard E. Fore
Draws its topicality and relevance from the fact that not only isthe Internet widely publicized in all the media but also there are manystories regarding problems with its…
Abstract
Draws its topicality and relevance from the fact that not only is the Internet widely publicized in all the media but also there are many stories regarding problems with its security. Provides a primer on the history, terminology, tools and common uses of the Internet. Identifies the most prevalent threats to security posed by using the Internet and discusses some of the traditional and emerging approaches to ensuring the security and integrity of data on the Internet.
Details
Keywords
Ethan Sanderson and Karen A. Forcht
Presents a young person’s view of the threats and security measures to deal with sensitive information in today’s constantly changing technological environment. Promotes the…
Abstract
Presents a young person’s view of the threats and security measures to deal with sensitive information in today’s constantly changing technological environment. Promotes the implementation of proactive security and warns of the problems caused by converging business markets and technologies. Discusses security policy, privacy, security logs, encryption, virus attacks, Internet concerns, firewalls and auditing. Outlines the work of the Computer Emergency Response Team and the Computer Incident Advisory Capability in the USA.
Details
Keywords
Joan C. Hubbard and Karen A. Forcht
A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads itself to…
Abstract
A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads itself to still other programs. Today’s society has seen a dramatic increase in the use of computers; as a result, businesses must take even more precautions to guard against the introduction of computer viruses into their systems.
Details
Keywords
Karen A. Forcht and Morey Oare
Provides a strong basic definition of the Information Highway (IH),including security, hardware and software and discusses the futureramifications. Identifies the four main…
Abstract
Provides a strong basic definition of the Information Highway (IH), including security, hardware and software and discusses the future ramifications. Identifies the four main parties involved: cable companies, telephone companies, Internet and the policy‐makers in Washington, detailing their opinions and interests. Specifies a number of legislative issues involved and discusses the role of the Clinton administration. Finally, discusses the resulting business and economic implications.
Details
Keywords
Geographic information systems (GIS) makes use of geographic data, such as streets, store points, and block or neighborhood areas, and attribute data, such as population, income…
Abstract
Geographic information systems (GIS) makes use of geographic data, such as streets, store points, and block or neighborhood areas, and attribute data, such as population, income levels, competition, and store sales, by integrating the two into a powerful spatial query. The techniques utilized include geographic mapping, digital mapping, aerial photographs, etc. Along with the convenience of using GIS, there are some concerns about privacy and security of the data and information. This paper addresses the security concerns related to this emerging technology.
Details
Keywords
James R. Butler and Karen A. Forcht
The information explosion had led to the emergence of electronic crimeboth in the transfer of electronic funds and the gaining of information.Reports on the introduction of the…
Abstract
The information explosion had led to the emergence of electronic crime both in the transfer of electronic funds and the gaining of information. Reports on the introduction of the clipper chip to protect information and gives a discription of how it works, giving definitions of various terms. Examines a number of problems associated with the chip: trade; effectiveness; Constitutionality; reliability; necessity. Suggests places of contact for further investigation and information.
Details
Keywords
Daphyne Saunders Thomas, Karen A. Forcht and Peter Counts
With an estimated over 40 million Internet users all over the world, things that once happened only in “real life” are starting to occur in this virtual world. This Internet, just…
Abstract
With an estimated over 40 million Internet users all over the world, things that once happened only in “real life” are starting to occur in this virtual world. This Internet, just like the physical world, cannot rely on laws alone to keep order. The rules that regulate behavior, the policies for what is acceptable and the laws that pertain to activities have developed and will continue to emerge over time. However, conflicts of interest are inevitable and wherever conflict occurs, the government will regulate on matters including e‐mail, data theft, piracy, search and seizure, electronic banking, offensive behavior, and other legal liability issues.
Details
Keywords
Karen A. Forcht and Joan Pierson
Looks at the wide‐ranging changes which are taking place in the computerindustry and what this means for security issues. Highlights currentcomputer crimes and looks at why…
Abstract
Looks at the wide‐ranging changes which are taking place in the computer industry and what this means for security issues. Highlights current computer crimes and looks at why computer crime has been able to increase, e.g. computer terrorism, sale of contaminated software, and why today there is a greater need for computer security. Refers to the Berne Convention and the “gold card proposal”. Discusses the attitudes for and against trans‐border data flow, and the now very public issue of privacy, including how the buying of information is being tackled and the consequences of the cashless society.