Search results

1 – 10 of 85
Article
Publication date: 1 May 1993

Kevin J. Fitzgerald

The need for security for the business user is all important thesedays especially as the trend is to distribute computing power in theuser environment. Examines risk analysis of…

Abstract

The need for security for the business user is all important these days especially as the trend is to distribute computing power in the user environment. Examines risk analysis of information security and its aim of placing risk exposures into perspective and providing a basis for comparing the risk exposure with the cost of the solution. Views two different approaches, qualitative and quantitative, based on the mixed influences of Dr Jerry FitzGerald′s matrix approach and Bob Courteney′s approximation scales. Assesses the strengths and weaknesses of the analysis.

Details

Information Management & Computer Security, vol. 1 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 February 1993

Kevin J. Fitzgerald

Discusses the change in business continuity planning whencentralized mainframe computing environments are replaced bydecentralized server/workstation/minicomputer…

Abstract

Discusses the change in business continuity planning when centralized mainframe computing environments are replaced by decentralized server/workstation/minicomputer environments. Telecommunications emerges as both the “soft spot” and the major challenge to strategy planners.

Details

Information Management & Computer Security, vol. 1 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 August 1995

Kevin J. Fitzgerald

Proposes that for a business continuity strategy to be adjudgedeffective, it must be matched to the business′ true tolerance, beenterprise‐wide, get the basics right, develop a…

1329

Abstract

Proposes that for a business continuity strategy to be adjudged effective, it must be matched to the business′ true tolerance, be enterprise‐wide, get the basics right, develop a business continuity ownership structure, establish a plan discipline and not over‐invest. Looks at each of these points in detail.

Details

Information Management & Computer Security, vol. 3 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 December 1996

Kevin J. Fitzgerald

Deals with the dangers to computer systems from flooding and water‐related hazards which so far appear to have been underestimated, and offers preventive and remedial advice to…

230

Abstract

Deals with the dangers to computer systems from flooding and water‐related hazards which so far appear to have been underestimated, and offers preventive and remedial advice to companies which may find themselves in such a position.

Details

Facilities, vol. 14 no. 12/13
Type: Research Article
ISSN: 0263-2772

Keywords

Article
Publication date: 1 March 1994

Kevin J. Fitzgerald

Network disaster recovery plans (DRPs) are just emerging as a businessissue. The need to make contingency plans in case of a computerdisaster, or major disruptions to the network…

1376

Abstract

Network disaster recovery plans (DRPs) are just emerging as a business issue. The need to make contingency plans in case of a computer disaster, or major disruptions to the network, is a vital part of corporate strategy. Discusses the roles that users, IT management and staff must play. Identifies users as responsible directly for the problem of security and for establishing the levels of security; whereas IT management staff must be responsible for the availability of IT. Highlights what measures can be taken to set up network DRPs, although advises against too complex strategies and plans, and emphasizes easy‐to‐maintain strategies. Concludes that a corporate policy must be developed to accommodate all the changes needed in selecting an appropriate DRP.

Details

Information Management & Computer Security, vol. 2 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 May 1995

Kevin J. Fitzgerald

Describes a set of “baseline” threats and presents thereasoning behind the “baseline” security approach. Discussesan example of the acceptance of the security baseline approach…

2802

Abstract

Describes a set of “baseline” threats and presents the reasoning behind the “baseline” security approach. Discusses an example of the acceptance of the security baseline approach and suggests the way in which it can be used. Describes the advantages and disadvantages of the approach and concludes that a baseline approach is worthy of consideration as a way forward.

Details

Information Management & Computer Security, vol. 3 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 October 1995

Kevin J. Fitzgerald

In a distributed computing environment, ownership of the securityproblem is avoided by management and users alike. Not only integrity andconfidentiality, but also network (i.e…

2254

Abstract

In a distributed computing environment, ownership of the security problem is avoided by management and users alike. Not only integrity and confidentiality, but also network (i.e. information, availability must be considered). Management has begun to realize that the security provided in the mainframe era has not been provided in the distributed environment. What must be considered now are the following issues: logical access controls access all platforms; improved network and platform reliability, and the ability to recover readily from disruption and disasters. Concludes that information security is absolutely vital to the survival of today′s enterprises and therefore should be given the emphasis it deserves at all enterprise levels.

Details

Information Management & Computer Security, vol. 3 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 March 1995

Kevin J. Fitzgerald

Deals with the dangers to computer systems from flooding andwater‐related hazards which so far appear to have been underestimated,and offers preventive and remedial advice to…

342

Abstract

Deals with the dangers to computer systems from flooding and water‐related hazards which so far appear to have been underestimated, and offers preventive and remedial advice to companies which may find themselves in such a position.

Details

Information Management & Computer Security, vol. 3 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 October 1994

Kevin J. Fitzgerald

Establishing information security in a downsized multi‐platform,multi‐vendor, enterprise‐wide information technology environment isemerging as the greatest challenge yet to…

496

Abstract

Establishing information security in a downsized multi‐platform, multi‐vendor, enterprise‐wide information technology environment is emerging as the greatest challenge yet to confront the information security industry. Outlines the problems, describes the ideal solution and suggests some currently possible solutions.

Details

Information Management & Computer Security, vol. 2 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 October 2010

Kevin K Byon, Michael Cottingham and Michael S Carroll

This study examines the relationship between spectator motivation and sports consumption behaviours in the context of an adaptive sport. Respondents were spectators from five…

Abstract

This study examines the relationship between spectator motivation and sports consumption behaviours in the context of an adaptive sport. Respondents were spectators from five matches held in the Midwest United States involving registered United States Quad Rugby Association teams. The Motivation Scale for Sport Consumption (MSSC; Trail & James, 2001) was adapted to measure spectator motivation and predict repatronage intentions and online media consumption among wheelchair rugby spectators. Results indicated that two spectator motivation factors, physical skill and knowledge, were related to repatronage intentions. In addition, knowledge and vicarious achievement were found to be related to online media consumption.

Details

International Journal of Sports Marketing and Sponsorship, vol. 12 no. 1
Type: Research Article
ISSN: 1464-6668

Keywords

1 – 10 of 85