Information Management & Computer Security: Volume 2 Issue 3


Table of contents


This article has been withdrawn as it was published elsewhere and accidentally duplicated. The original article can be seen here: 10.1108/02634509310051533. When citing…

To Serve and Protect: : Reconciling Information Protection with LAN Environments

Kenneth P. Weiss

There is a hierarchically related set of fundamental securitytechnologies that have been used (sometimes without need for thehierarchy) in the late 1970s and 80s to…

Minimizing Risk in Your Wide Area Network Design

Graham P. Bell, David Kavanagh

If you understand the fundamental objectives of your organization andhow your telecommunication network assists you to achieve theseobjectives you will have a sound basis…

The Data Network Disaster Recovery Plan: : Considerations and Concerns

Stewart White

First, know your network, its key points, the geographic nature of thebusiness and how disaster can happen. Second, understand where thenetwork bottlenecks are positioned…

Developing a Successful Network Disaster Recovery Plan

Bruce Edwards

Concentrates on the preparation for and the procedures to be followed increating a disaster recovery plan. The recovery strategy, recoveryteams, procedures and action…

New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade

Kenneth P. Weiss

Argues that the Clipper chip is an expensive, flawed technology which isbeing aggressively proposed by the US administration and may permanentlyerode personal privacy…

EDI Security Issues Can Be Overcome

David Hains

Technical problems of standardizing on adequate measures for security,integrity and authentication constitute a major reason why EDI has beenslow to catch on. Describes…

Cover of Information Management & Computer Security



Online date, start – end:

1993 – 2014

Copyright Holder:

Emerald Publishing Limited

Open Access: