Search results

1 – 10 of over 8000
Article
Publication date: 1 April 1990

Paul A. Collier and Barry J. Spaul

Internal auditors have an important role in communicating thethreat posed by the spread of computer viruses and advising onappropriate control strategies. Computer virus

Abstract

Internal auditors have an important role in communicating the threat posed by the spread of computer viruses and advising on appropriate control strategies. Computer virus is defined, distinguishing between “trueviruses and other rogue software like logic bombs, Trojan horses and worms. Some reported incidents are discussed; the application of risk management as an effective approach is considered. Control techniques are listed under the categories: organisational, software and hardware. How epidemiological analogy can be applied in high risk situations is explored through a system infection control programme under the direction of a system infection control committee.

Details

Managerial Auditing Journal, vol. 5 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 1 March 1991

Michael Schuyler

Virus Attack!. Just a few weeks ago one of our PCs was attacked by the “stoned” virus, a virulent strain that attaches itself to the boot sector and partition table of any…

Abstract

Virus Attack!. Just a few weeks ago one of our PCs was attacked by the “stoned” virus, a virulent strain that attaches itself to the boot sector and partition table of any disk that happens to be around. If you have a hard disk, all you have to do is place an infected floppy disk in Drive A: and ask for a directory listing (DIR). That's enough to transfer the virus to the hard disk; from there it will infect every other floppy you place into the system.

Details

Library Workstation Report, vol. 8 no. 3
Type: Research Article
ISSN: 1041-7923

Article
Publication date: 1 May 1998

H. Joseph Wen

Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this…

3206

Abstract

Organizations and individuals today need to have a comprehensive virus protection policy to face the growing threats of Internet computer viruses. The purpose of this paper is to introduce to the reader the threats that Internet computer viruses can cause and provide guidelines on how organizations or individuals can protect themselves against these viruses. Discusses the full set of virus types. Recommends the development of virus protection policy for organizations.

Details

Information Management & Computer Security, vol. 6 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 14 September 2012

Imran Khan

The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest…

3239

Abstract

Purpose

The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention.

Design/methodology/approach

The author undertook an extensive study and review of the literature available online and on relevant web sites on the present topic.

Findings

A large number of viruses were found during the study, which are causing serious damages to computer systems. The author suggests ways to detect and prevent the different computer viruses.

Research limitations/implications

The research is based on and limited to the study of the relevant literature available on different relevant web sites.

Practical implications

The research will benefit business organizations, business houses, educational institutions and libraries working in fully computerized environments, in detection of viruses and preventing infection of their computer systems.

Social implications

The society will also benefit by attaining knowledge about the different types of computer viruses and the measures of prevention of infection.

Originality/value

There are a number of studies and articles available on the topic but almost all of them appear to be incomplete in the sense that either they discuss only a limited number of known viruses or suggest only limited ways of prevention. The paper has made an attempt to discuss almost all the computer viruses and every possible way of prevention of infection from them.

Details

Library Hi Tech News, vol. 29 no. 7
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 1 February 1998

Joan C. Hubbard and Karen A. Forcht

A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads…

2231

Abstract

A computer virus is a program that can infect other programs by modifying them to include a copy of itself. When the infected programs are executed, the virus spreads itself to still other programs. Today’s society has seen a dramatic increase in the use of computers; as a result, businesses must take even more precautions to guard against the introduction of computer viruses into their systems.

Details

Industrial Management & Data Systems, vol. 98 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Abstract

Details

International Case Studies in the Management of Disasters
Type: Book
ISBN: 978-1-83982-187-5

Article
Publication date: 11 October 2021

Muhammad Farhan Jahangir Chughtai, Saira Tanweer, Samreen Ahsan, Tariq Mehmood, Atif Liaqat, Adnan Khaliq, Tahir Zahoor, Muhammad Nadeem, Nazia Khalid, Saadia Zainab and Syed Junaid-ur-Rahman

Corona viruses have spiked structure and enveloped glycoproteins in their structure, along with specific proteins in membranes. The mode of action of COVID-19 consists of…

Abstract

Purpose

Corona viruses have spiked structure and enveloped glycoproteins in their structure, along with specific proteins in membranes. The mode of action of COVID-19 consists of three phases, i.e. viral replication, immune hyperactivity and pulmonary destruction. However, angiotensin-converting enzyme is an essential receptor that causes COVID-19. After infecting any individual, COVID-19 develops in specific pattern with the following stages: replication stage and adaptive immunity stage. After adaptive immunity stage, the clinical symptoms of patient include cough, fever, runny nose, shortness of breath and many more. To cope with this COVID-19, food and nutrition played an important role. The purpose of this review article is to emphasize the significance of food and immunity to reduce COVID-19 attack among susceptibles.

Design/methodology/approach

In the present era, corona virus, a member of crown-shaped type, created a pandemic situation around the globe owing to its capability to move from human to animals and vice versa. This virus can transfer its 35% infection to the individuals. Contemporarily, this outbreak was observed in Wuhan, China in December 2019 and affected a huge number of communities by spreading like common flu. However, after investigation, it was revealed that COVID-19 is different from common flu regarding respiratory illness created by this novel coronavirus along with its taxonomy.

Findings

Over and above to all the aforementioned food safety concerns, it is suggested to use sufficient supply of green leafy vegetables along with fiber-rich foods such as legumes, beans, whole grains and vegetables. It is further good for health to get all these varieties whole and organic. The individuals should use probiotics (lactobacillus) on daily basis as a source of diary probiotic that can further bind to the virus directly and then can inhibit the viral attachment with body cells; also the probiotics are claimed to enhance the immune system of the body.

Research limitations/implications

In the case of fruits and vegetables purchased, it must be thoroughly washed with water and then disinfected; after pat drying, these fruits and vegetables can be moved to the refrigerator and stored along with other foods. During the outbreak of COVID-19, the partially cooked or ready-to-eat foods should be avoided, especially eggs, meat, meat products, milk and milk-related products. On the other side, nuts should not be consumed; if required, then it must be properly roasted at home before consumption.

Practical implications

The baked product right after coming out of oven is completely safe; however, these are contaminated during handling such as crumb in case of bread and with knives; so in the breakout of any viral attack, the individuals should avoid slicing of the bread. Moreover, it is recommended to place the baked products in personal bags instead of bulk quantity. Before the consumption, the baked products should be toasted, microwaved or heated with the help of pan (traditional) to reduce the amount of viral load.

Social implications

Dietary supplements are taken by most of the people on daily basis or sporadically especially when they are suffering from inflammation or cold. They have options while selecting these types of supplements such as probiotics, Echinacea, omega-3 fatty acids, vitamins D and E, calcium glucosamine, garlic and iron. These supplements are beneficial for the group of population who do not eat diversity of food as sufficient amount of essential nutrients is provided through this pathway.

Originality/value

This work is original in its novelty.

Details

Nutrition & Food Science , vol. 52 no. 2
Type: Research Article
ISSN: 0034-6659

Keywords

Article
Publication date: 24 August 2021

Bingi Manorama Devi, Sandeep Vemuri, A. Chandrashekhar, Sushama C., Praful Vijay Nandankar and Pankaj Kundu

The COVID-19 pandemic has led to a huge loss of human life worldwide and presents an unprecedented challenge to public health, food systems and the world of work. Tens of…

Abstract

Purpose

The COVID-19 pandemic has led to a huge loss of human life worldwide and presents an unprecedented challenge to public health, food systems and the world of work. Tens of millions of people are at risk of falling into extreme poverty due to loss of their carriers. Mainly, the people who work in public places are impacted due to this decease. The frontline warriors such as doctors, health workers, sweepers and policemen showed their effort to reduce the spreading of the virus. In this paper gives the detailed view of how the corona virus evaluated and how it spread from one person to another person and how we prevent this virus. The purpose of the paper, detailed about the diagnosis of the virus in the human body. There are some tests associated to know the presence of virus in our body; these are nose test, chest scan and CT scan of lungs.

Design/methodology/approach

Molecular analysis methods such as antibody or enzyme tests are used to assess whether the infection is present. The most common lancing techniques include using a cotton swab is in the back of the neck. Then hands over the sample to the doctor for examination. Polymerase chain reaction (PCR) is performed on the sample. This test screens for viral DNA. A CO19 PCR test can detect unique SARS-2 gene products. If one of these genes is ignored, it will return as an invalid result This test is useful only for patients who are already suffering from COVID-19. You cannot know if anyone has the infection, and they cannot say for sure whether they ever did. Serological tests are particularly useful for detecting cases of infection with mild or no symptom.

Findings

In this paper, the different tests provided to diagnosis the virus and the prevention measures to be taken to prevent the virus from spreading from one person to another are explained.

Originality/value

This work presents the original contribution and information of the COVID-19 pandemic.

Details

World Journal of Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 1 June 2004

Asoke K Talukder and Debabrata Das

Viruses, worms, Trojan horses, spywares have been effective for quite sometime in the domain of digital computers. These malicious software cause millions of dollars of…

Abstract

Viruses, worms, Trojan horses, spywares have been effective for quite sometime in the domain of digital computers. These malicious software cause millions of dollars of loss in assets, revenue, opportunity, cleanup cost, and lost productivity. To stop virus attacks, organizations frame up different security policies. These policies work only within the limited domain of the organization’s network. However, the emergence of wireless technologies, and the seamless mobility features of the wireless devices from one network to the other have created a challenge to uphold the security policies of a particular network. Hence, in this digital society, while mobile devices roam in foreign networks, they get infected through viruses in the foreign network. Anti‐virus software is not so effective for novel viruses. There have been no reports of mobile‐phone viruses in the wild as yet. However, with the emergence of execution environments on mobile phones, it will be possible to write viruses and worms for mobile devices in cellular networks. We should be prepared to fight against viruses in the cellular networks. All the technologies available to fight against viruses are specific to virus signatures. We propose that this fight needs to be multilayered. In this paper the authors have proposed a novel philosophy in cellular network called Artificial Hygiene (AH), which is virus neutral and will work at the class level. With this process a device and the network will take the necessary steps to keep the digital environment safe.

Details

Journal of Systems and Information Technology, vol. 8 no. 1/2
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 1 December 2002

A. Coulthard and T.A. Vuori

This paper provides interesting insights for anti‐virus research, as it reflects a period of rapid uptake in the application of the Internet and the use of e‐mail for…

2301

Abstract

This paper provides interesting insights for anti‐virus research, as it reflects a period of rapid uptake in the application of the Internet and the use of e‐mail for business purposes. The purpose of the research is to provide independent justification of the growing prevalence of computer virus incidents over the past five years, and identify patterns in the frequency and distribution of computer viruses. Specifically, the analysis focuses on examining the claims that computer viruses are increasing in prevalence, that computer viruses follow an evolutionary pattern and that seasonality exists in the distribution of computer viruses.

Details

Logistics Information Management, vol. 15 no. 5/6
Type: Research Article
ISSN: 0957-6053

Keywords

1 – 10 of over 8000