Showing 91 - 100 of 8,911
While banking system of Kazakhstan has been reformed during the past two decades to transition to the international standards, privacy of financial information seems to be left neglected. With the advent of the technological era and, hence, the rapid growth of computer crime, privacy of...
Persistent link: https://www.econbiz.de/10009459226
University of Minnesota Ph.D. dissertation. December 2009. Major: Computer Science. Advisor: David Lilja. 1 computer file (PDF); x, 108 pages, appendix A. Includes Vita page 106.
Persistent link: https://www.econbiz.de/10009462870
The empirical study of this paper focuses particularly on the UK financial industry fortrends in the framework of policies in order to manage information security as operational risk andhow corporate governance plays a vital role in framing policies within the company (Poole andCISM, 2006). The...
Persistent link: https://www.econbiz.de/10009463283
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users? access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer...
Persistent link: https://www.econbiz.de/10009483459
IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making...
Persistent link: https://www.econbiz.de/10009483706
Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information for a given organisation. We argue that the traditional orientation of these methodologies, towards the identification and assessment of technical information...
Persistent link: https://www.econbiz.de/10009484051
’ research and experience, organizations often concentrate mainly on other security categories (Correct processing in application …
Persistent link: https://www.econbiz.de/10011315734
This paper analyses some specific issues about the auditing of electronic auction systems. Communication within the Internet online auction systems generally takes place without users being in physical contact or knowing anything about each other. Therefore, they have to rely upon that...
Persistent link: https://www.econbiz.de/10011315987
Information security (INFOSEC) seeks to integrate previously distinct disciplines such as: employee security, computer security, communications security and operational security. It is ensured by an appropriate set of controls, which can be principles, practices, procedures, organizational...
Persistent link: https://www.econbiz.de/10014465782
Eine große Bedrohung für die Informationssicherheit geht von Mitarbeitern aus, die absichtlich der eigenen Organisation schaden wollen. Mitarbeiter besitzen Zugriffsrechte für sensible Informationen und genießen das Vertrauen des Unternehmens. Werden sie allerdings aufgrund persönlicher...
Persistent link: https://www.econbiz.de/10014503739