Table of contents
A computer emergency response team policy
Charles Cresson WoodPoints out the job security risk to those responsible for the security of computerized information systems in the event of system failure resulting in financial loss. Argues that…
Corporate policy at Cable & Wireless enhances business efficiency and improves quality of working life
K.J. FitzgeraldDescribes how the business networks division of Cable & Wireless has pioneered a teleworking programme called “Global Office” which enables portable computer‐using managers and…
Mobile secure telephones
Charles BrooksonDescribes GSM, a TMDA digital radio system which has more than 120 operators in over 60 countries and allows international roaming with only a contract between operators to…
Developing a suitable business continuity planning methodology
Goh Moh HengPresents the methodology used by a UK‐based multinational banking group to develop its business continuity plans. Describes the stages (modules) in the methodology sequentially…
Data security report
K.J. FitzgeraldHighlights the findings of an extensive, questionnaire‐based programme of research into data security among medium‐sized and large organizations in the UK. Comments on the ways in…
Providing security for Unix networks
Bev StymiestDescribes the TurnStyle family of security products developed by Atlantic Systems Group, of Fredericton, New Brunswick, to meet the security needs of Unix‐based networks. Claims…
Telework: threats, risks and solutions
Alice SturgeonProvides a definition of, and a background to, teleworking; points out the advantages to organizations and employees, and the economic and demographic factors which have…
Collaborative computing, groupware and knowledge
Jan DuffyAddresses the changes to organizations and to work life resulting from technology‐ enabled changes in the global economy. Postulates that collaboration, as distinct from…
KPMG’s UK Computer Security Review 1994
Brian Kearvell‐WhitePresents the findings of KPMG’s second computer security survey of 1,500 organizations. Defines computer security as comprising those procedures which ensure that computer‐held…
Getting beyond the dark side of distributed computing
Randy HowePresents major findings from an in‐depth multi‐company American study on the effective management of the distributed computing environment. The study, led by Cambridge Technology…