Table of contents
Doing business on the Internet: marketing and security aspects
Karen A. ForchtAcknowledges that many prospective business users are wary of the Internet because of existing and potential security loopholes. Gives an overview of the security problems and…
An integrated approach for system evaluation: study results
Mohamed H. AbdallahIntroduces an integrated approach for information system evaluation. The approach utilizes a model which consists of four parts: system environment; methodologies; documentation;…
Factors in the selection of a risk assessment method
Sharman LichtensteinA risk assessment method is used to carry out a risk assessment for an organization’s information security. Currently, there are many risk assessment methods from which to choose…
The Ernst & Young International Information Security Survey 1995
Ernst, YoungSummarizes the results from a survey of 1,100 UK organizations and 1,300 US organizations. Disaster recovery plans have been established by most but not tested. Internet security…
Information owners, custodians and users
Charles Cresson WoodDefines a frequently encountered method for assigning information security responsibilities involving three terms: “owners”; “custodians”; and “users”. The objective of this…
The Thornton May Files
Thornton A. MayPulls from extensive research and experience to provide commentary and insight on a range of management issues in the information technology world. Draws a picture of the issues…