Search results

1 – 10 of over 3000
Article
Publication date: 1 February 1998

Joan C. Hubbard and Karen A. Forcht

A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads…

2231

Abstract

A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads itself to still other programs. Today’s society has seen a dramatic increase in the use of computers; as a result, businesses must take even more precautions to guard against the introduction of computer viruses into their systems.

Details

Industrial Management & Data Systems, vol. 98 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 14 September 2012

Imran Khan

The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest…

3239

Abstract

Purpose

The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention.

Design/methodology/approach

The author undertook an extensive study and review of the literature available online and on relevant web sites on the present topic.

Findings

A large number of viruses were found during the study, which are causing serious damages to computer systems. The author suggests ways to detect and prevent the different computer viruses.

Research limitations/implications

The research is based on and limited to the study of the relevant literature available on different relevant web sites.

Practical implications

The research will benefit business organizations, business houses, educational institutions and libraries working in fully computerized environments, in detection of viruses and preventing infection of their computer systems.

Social implications

The society will also benefit by attaining knowledge about the different types of computer viruses and the measures of prevention of infection.

Originality/value

There are a number of studies and articles available on the topic but almost all of them appear to be incomplete in the sense that either they discuss only a limited number of known viruses or suggest only limited ways of prevention. The paper has made an attempt to discuss almost all the computer viruses and every possible way of prevention of infection from them.

Details

Library Hi Tech News, vol. 29 no. 7
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 1 April 1990

Paul A. Collier and Barry J. Spaul

Internal auditors have an important role in communicating thethreat posed by the spread of computer viruses and advising onappropriate control strategies. Computer virus

Abstract

Internal auditors have an important role in communicating the threat posed by the spread of computer viruses and advising on appropriate control strategies. Computer virus is defined, distinguishing between “trueviruses and other rogue software like logic bombs, Trojan horses and worms. Some reported incidents are discussed; the application of risk management as an effective approach is considered. Control techniques are listed under the categories: organisational, software and hardware. How epidemiological analogy can be applied in high risk situations is explored through a system infection control programme under the direction of a system infection control committee.

Details

Managerial Auditing Journal, vol. 5 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 1 May 1998

H. Joseph Wen

Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this…

3206

Abstract

Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this paper is to introduce to the reader the threats that Internet computer viruses can cause and provide guidelines on how organizations or individuals can protect themselves against these viruses. Discusses the full set of virus types. Recommends the development of virus protection policy for organizations.

Details

Information Management & Computer Security, vol. 6 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 April 1999

Howard Falk

Many library computers are now connected to each other through networks and to the rest of the world through the Internet. Current information of unprecedented scope and…

1299

Abstract

Many library computers are now connected to each other through networks and to the rest of the world through the Internet. Current information of unprecedented scope and scale is now available on the computer screen. There is, however, a dark side to all this computer interconnectivity, since it increases the possibility of diliberate unsolicited intrusion into library computers. When such an intrusion occurs, it may come in the form of a computer virus playfully invented by some computer hacker, or it may come as an uninvited e‐mail message from an eager online salesman. There are even some spiteful, vengeful, paranoid attackers who aim to cause destruction. Some intrusions can damage valuable computer‐stored information; others m ay simply divert the attention of a computer user. Protective measures should be taken to avoid some intrusions; others can simply be ignored. In this article, we take a look at some frequently encountered computer intrusions.

Details

The Electronic Library, vol. 17 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 28 January 2014

Pei-Chen Sung, Cheng-Yuan Ku and Chien-Yuan Su

Understanding the computer-virus propagation is quite essential for the construction and development of anti-virus policy. While researches about the anti-virus policy…

Abstract

Purpose

Understanding the computer-virus propagation is quite essential for the construction and development of anti-virus policy. While researches about the anti-virus policy have been extensively investigated, the viewpoint from sociological perspective is relatively ignored. Therefore, this paper aims to explore the dynamics of computer-virus propagation and evaluate the effectiveness of anti-virus policies through the sociological perspective.

Design/methodology/approach

This research constructs a virus-propagation model based on the susceptible-exposed-infective-recovered epidemic concept to simulate and explore the dynamic behavior of multipartite computer viruses through the tool of system dynamics. The effectiveness of various anti-virus policies is then evaluated via this model.

Findings

The frequency of media contact has a significant effect on the virus infection rate. The effectiveness of user self-prevention relies on the usefulness of the virus signatures. The reporting/alarm process can enhance the capability of anti-virus software company and the detected intensity of new threat. The quarantine policy can effectively reduce the spread of computer virus.

Practical implications

Individuals should strengthen the self-awareness of information security to reduce the negative impact. Managers should construct and implement the information security norm to regulate the behavior of staff. Anti-virus software companies should strengthen the capability of their automatic reporting/alarm mechanism to early detect the exceptional conditions and control new threats in time.

Originality/value

Information security management research is still in the growth phase, but it is critically important to establish the groundwork for understanding of computer viruses and the effectiveness of anti-virus policy from assorted perspectives. The major contribution of research is to explore the propagation of multipartite computer viruses and study how to prevent their destruction from the sociological and technical perspectives.

Details

Industrial Management & Data Systems, vol. 114 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 May 2007

John Rice and Nigel Martin

A strong and fast‐cycle innovation system has been developed to counter the ongoing threat of computer viruses within computer systems employing vulnerable operating…

1411

Abstract

Purpose

A strong and fast‐cycle innovation system has been developed to counter the ongoing threat of computer viruses within computer systems employing vulnerable operating systems. Generally, however, the innovative applications that develop in response to each generation of computer virus can be seen as a reactive, rather than proactive, critical response. The paper seeks to present a critique of the innovation system that has emerged to combat computer viruses by comparing it with its natural system namesake, the human anti‐viral immune system. It is proposed that the relevance of this analogy extends beyond this case to innovation systems more generally.

Design/methodology/approach

This paper discusses the biological theory related to the human body's immune system and how immune systems might be mimicked in the development of security systems and anti‐virus software. The paper then outlines the biomimicry framework that can be used for scoping the development and features of the security systems and software, including the population of the framework segments. The implications of biomimetic approaches in the wider innovation management literature are discussed.

Findings

Some commercial security products that are undergoing evolutionary development and current research and development activities are used to augment the biomimetic development framework and explicate its use in practice. The paper has implications for the manner in which the objectives of innovation systems are defined. There is implicit criticism of linear models of innovation, that by their nature ignore the recursive and/or adaptive processes evident in natural systems.

Originality/value

This is the first paper, to the best of the authors' knowledge, that discusses the application of natural systems and biomimetics to broaden the scope of innovation process design, and link its findings back to the wider innovation literature.

Details

European Journal of Innovation Management, vol. 10 no. 2
Type: Research Article
ISSN: 1460-1060

Keywords

Article
Publication date: 1 March 1995

Richard Cardinali

The thrust of management information system (MIS) operations is tokeep an information system running smoothly and to ensure services aredelivered in an uninterrupted…

1367

Abstract

The thrust of management information system (MIS) operations is to keep an information system running smoothly and to ensure services are delivered in an uninterrupted, reliable and secure fashion. This poses a special challenge in today′s environment of computer misuses. Focuses on four main areas normally addressed when protecting a company′s most vital asset – its database. These are: information system vulnerability; computer crime; employee access; and personnel policies. Examines research pertaining to safeguarding data, software and hardware from deliberate computer‐based information security breaches.

Details

Information Management & Computer Security, vol. 3 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 October 2004

Dong‐Her Shih and Hsiu‐Sen Chiang

An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the infected e‐mails are opened, the e‐mail virus

1588

Abstract

An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the infected e‐mails are opened, the e‐mail virus spreads itself to others. Today's society has seen a dramatic increase in the use of e‐mails. As a result, organizations must take even more precautions to guard against the introduction of e‐mail viruses into their systems. This paper discusses how organizations can protect their e‐mails from the intrusion of e‐mail virus and how to develop their own e‐mail virus security plan.

Details

Online Information Review, vol. 28 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 1 March 2003

Joseph S. Sherif and David P. Gilliam

The growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However…

1831

Abstract

The growth of Inter‐ and intranets and the sharing of software have led to a rise in the transmission of viruses, especially among the PC and MAC platforms. However, maintaining virus protection software and pattern updates for any large organization is a monumental problem, especially when the organization supports multiple platforms and operating systems. The Jet Propulsion Laboratory (JPL) and other National Aeronautics and Space Administration (NASA) Centers have had problems maintaining current virus protection software and pattern files, and so NASA asked the JPL Network and Computer Security (NCS) Group to lead an effort to search for a comprehensive solution. This paper puts forward a study, analysis and recommendations concerning anti‐virus software solutions, problems encountered and their resolutions. One of the key issues was finding a single‐source anti‐virus software solution. Selection and deployment of single‐source anti‐virus software were successful. The lessons learned in the deployment of a software product site‐wide may benefit other organizations facing a similar situation.

Details

Information Management & Computer Security, vol. 11 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of over 3000