You are on page 1of 7

MIT International Journal of Computer Science & Information Technology Vol. 1, No. 1, Jan. 2011, pp.

1-7 1
ISSN 2230-7621 (Print Version) 2230-763X (Online Version) MIT Publications

E-Security Problems, Policies for


Networked Information Systems
Arun Kumar Singh Sharad Nigam
Sherwood College of Professional Management, Sherwood College of Professional Management,
Sec 25, Indira Nagar, Lucknow Sec 25, Indira Nagar, Lucknow

Abstract - With the rapid growth of e-commerce, how these agencies and organization secured the clients
governmental and corporate agencies are taking extra private and personal information in the global networked
precautions when it comes to protecting information. The information systems.
development of e-security as a discipline has enabled A model is presented to illustrate the factors which affected
organizations to discover a wider array of similarities between the security issues of networked information systems. Before
attacks occurring across their security environment and that, some of the terms which are used throughout the paper
develop appropriate countermeasures. To further improve the should be brief first.
security of information, there is a need for conceptualizing
AICPA: American Institute of Certified Public Accountants
the interrelationships between e-security and the major
is the national, professional organisation for all certified
elements involved in changing a companys infrastructure.
public accountants.
Organizations should act in an ethical manner, especially
when it comes to e-security and e-privacy policies, CPA: Certified public accountants.
procedures, and practices. The consequential theory of DOS/DDOSDenial of service/distributed denial of service.
utilitarianism is used and applied to a conceptual model to A form of network attack in which a site or network is flooded
help explain how organizations may develop better secured with so many fictitious requests or packets simultaneously
information in an information-sharing and globally that it cannot respond to legitimate requests. DDOS hits
networked environment. multiple sites or networks at the same time.
Firewall: A device that uses hardware and software to
Keywords: E-Security, E- commerce, Data Security, Criminal protect a LAN from penetration attempts from the Internet.
IEEE: Institute of Electrical and Electronic Engineers
1. INTRODUCTION provides the standard for electrical and electronic devices.
In the current days, computer and Internet become so IP address: Four 8-bit numbers used to uniquely identify
popular, every person has email-ids ATM, net banking every machine on the Internet or network.
facility with their bank accounts, credit cards etc. so public Local area network: A network that is designed to span a
and private involvement in e-security issues protecting the small geographic area such as a single building.
privacy of confidential information is quickly becoming a Network interface card (NIC): A hardware device that plugs
measure of success in the business world, because companies into a computer and connects it to a network.
improve their reputation when they take care to safeguard the Sniffers: Another term for a network analyzer a device that
personal data people entrust to them. Banks, hospitals, listens to a network in promiscuous mode and reports on
organizations are the information systems, which have traffic.
financial records and customer data. TCP/IP: The protocol suit is the use for Internet
There has been an explosion in e-commerce exchanges and communications.
sharing of information over the Internet. Companies are now WEP: Wired equivalent privacy a security protocol for
connecting their self-contained IT infrastructures to the wireless local area networks.
Internet. Lower cost, opportunity and wider reach are driving
these changes: In the brick and mortar days, time was money. 2. E-SECURITY ISSUES IN NETWORKED
Now, the information is money. INFORMATION SYSTEMS
Unfortunately these facilities opened up also opportunity for Model development is associated with the improved security.
the cyber terrorist, hackers, and crackers to launch the attacks The model shown in Fig. 1 is illustration of some of the
of viruses, Trojans, and worms and bombs etc, against different element that affects the companys information
organization and government agencies. Now the question is security infrastructure. Each element on the model is
MIT International Journal of Computer Science & Information Technology Vol. 1, No. 1, Jan. 2011, pp. 1-7 2
ISSN 2230-7621 (Print Version) 2230-763X (Online Version) MIT Publications

dependent on each other for the final outcome of a more TYPES OF CYBER CRIMINALS
secure information system. The theoretical framework that
drives the model is the consequential theory of utilitarianism Cyber criminals are of basically three types:
(Ashein and Buchholz, 2003; Wong and Beckman, 1992).
This theory represents such factors which are depends on
behavior of linked components, which are difficult to manage 2.1.1 T HE IDEALISTS (TEENAGERS)
practically in real world, so it is the shortcoming also of this Looking for freedom & identity
theory.
The idealists, almost all teenagers, are the group of
society that adhered the most rapidly to this new cyber-
2.1 SECURITY THREATS culture. The explication resides in the fact that the
Security threats are among the first elements in the Internet gives them the freedom they are looking for at
e-security model presented in Fig. 1. In recent years, the their age: Within a few clicks, they can communicate with
Internet has become a potential market for businesses to sell the world and explore new horizons. They don't have to
products, transmit or collect information, and offer services. wait to get a telephone or a car which still does not
Ten years ago, cyber warfare was an unfamiliar term in offer the same level of communication deepness and
India. If it was recognized, it was something abstract that intensity that the Internet does.
occurred to the United States Pentagon servers, where kids Moreover, they are the target of the science-fiction
could break in and access data. It certainly had nothing to do literature and of all the entertainment industry that has
with India. Then, when the Indian Computer Emergency jumped quickly in the matter to seduce its audience with
Response Team (CERT-In, apex authority in India for Cyber movies like the Net (1995) Hackers (1995), Enemy of the
Safety) reported 5200 Indian websites defaced, Indian State (1998), the Matrix (1999), Hackers 2: takedown
citizens woke up. Indian banks started issuing phishing alerts (2000) or Bait (2000).When they decide to commit a cyber-
for numerous phishing scams. (In 2007 alone, 392 cases were crime, it is usually only to be in the spotlight of the medias and
reported to CERT-In by various Indian and worldwide to show their strength to their friends in order to rise into their
agencies an average of 32 phishing cases a month.) GSM local community hierarchy.
users started getting viruses on their handsets. The Pakistani
terrorist network started using Russian servers to e-mail
threats, posing as Indian terrorist groups. 2.1.2 G REED MOTIVATED (CAREER
CRIMINALS)
Criminologists pretend that crime is part of our society. It
has always existed and will always exist. Therefore, career
criminals are just adapting themselves to a new world full of
technology. Bank robbers used to stop horses, then trains
transporting goods full of dollar value. It is therefore a normal
evolution that this category of cyber-criminals is now
attempting to sneak in the flux of financial information
transported electronically and to steal some of it.

2.1.3 T HE CYBER-TERRORISTS
The newest and most dangerous category;
This category is the newest as well as the potentially most
dangerous. Their primary motive is usually not only money but
also a specific cause that they defend. The common belief that
they exist only in the imagination of literature or movie
writers needs to be revised. So far, only the Greed-motivated
or the Idealist cyber-criminals have dared to attack
National vital infrastructure and have therefore not caused
destructive damages. But the mentality and an ever more
powerful, costless and accessible technology as well as our
increasing dependency on computers has turned this remote
Fig. 1 E-security Model science-fiction threat in to close reality.
MIT International Journal of Computer Science & Information Technology Vol. 1, No. 1, Jan. 2011, pp. 1-7 3
ISSN 2230-7621 (Print Version) 2230-763X (Online Version) MIT Publications

Very serious cases like the shutdown of an airport tower control VIRUSES, WORMS, AND TROJAN HORSES
during 6 hours, the hacking of California government computers
Other e-security threats to a company come in the form of
responsible to manage the delivery of electricity or the daily
viruses, worms, and Trojan horses.
attack and penetration of federal agencies computer servers
such as the National Security Agency (N.S.A.) and the
Department of Defense (DOD) show the weaknesses and Virus: A virus may be defined as a program that replicates
fragility of the National vital infrastructures. itself to infect many computers. Viruses may be passed from
computer to computer via a network connection, e-mail, and
removable media such as floppy disks. There are several
2.1.4 SECURITY THREATS FROM INSIDE THE different kinds of viruses that may cause a loss of information
COMPANY in a companys network. For example, a network virus
Many inside threats come from disgruntled current utilises network protocols, commands, messaging programs,
employees, former employees with a grudge, model and data links to spread itself across a network. These viruses
employees who may need quick cash, or employees that have may destroy or damage files, or may just cause an annoying
left the company and have gone to work for a competitor. In a pop up message to appear. Another type of virus is a file-
company not all employees have the same access to infected virus. These types of viruses attach themselves to
information. This may help reduce the amount of damage that executable files. These viruses may infect many programs and
an employee may do, but all it would take is for one of them files. To get rid of file- infected viruses a computer will not
to gain administrative rights via cracking the SAM (security only need to be disinfected by an antiviral program, but also
access manager) and the entire system is in jeopardy. may need its major software, such as operation systems and
applications, reinstalled.
2.1.5 INTERNET SECURITY BREACHES
Worms: Worms are not considered true viruses. They are
Most Internet security breaches may be classified as: programs that travel between computers and across networks,
password-based attacks, IP spoofing, attacks that exploit such as the dangerous W32/ Sobig.F virus. Worms are usually
trusted access, network snooping, and attacks that spread through some form of file transfer or more commonly
exploit technology vulnerabilities (Cheng et al., 1999; Smith, by E-mail. A worm may contain and launch viruses if they are
2002, 2003; Smith and Offodile, 2002; Smith and Rupp, executed. Worms may cause massive file damage.
2002a, b, c). With these security breaches, the cracker may
steal confidential information, alter the integrity of Trojan horse: Trojan horse viruses are not viruses at all.
information and/or reduce/stop the availability of the network They are programs that appear to do one thing that is useful,
to its users. Each of the previous security breaches may be but instead they harm the computer or system they have
classified into three broader categories. These categories infected. A Trojan horse may be easily recognized since it is
include annoyance and loss, breaking and entering, and usually an executable file for a program. They may cause
penetration and theft (Campbell and McCarthy, 2001; Smith wide spread damage to files and systems. They have also been
and Rupp, 2002 a, b, c). used to launch programs that scan a computers hard drive and
The first category of general annoyance and/or loss consists look for personal information such as network IDs,
of denial of service (DOS) and distributed denial of service passwords, and telephone numbers. They eventually send this
(DDOS) attacks. DOS attacks happen when a cyber criminal information via e-mail to the attacker. In general, with all
bombards an individual Web site or network segment with these threats to security, a governmental or corporate agency
billions of simultaneous hits using host or affected computers. needs to have a clear set of rules and policies on how to deal
DDOS-type attacks are basically the same as a DOS attack, with these problems. This comes in the form of a strategy for
but it affects multiple websites and network segments at a security, which is the next element in the e-security model.
time. These two attacks bring Web sites and networks to a
virtual stand still, causing some to completely crash due to 2.2 EXPLORING SECURITY STRATEGY
servers becoming completely inundated with network traffic.
This prevents regular users from logging on to the network or The first step on securing any networked information system
using the Web site for legitimate reasons. Virtually all Web and its electronic data is design and implements the security
sites and networks are susceptible to these kinds of security policy for that system. Policy are important because they told
risks and all governments and firms must be on constant alert us what is to protect and how much to protect them. A
for their potential presence. Cyber criminals launching these security policy should define clearly Companys goals for
types of attacks are usually not into privacy contravention, security, security risks to a company and its systems, the
data corruption, or data theft. They merely want to cause levels of authority (designate a security coordinator and
widespread disruptions of services. Governments and security team members), responsibilities of all employees
companies may suffer a gamut of tribulations from DOSs- and in regards to security and procedures for handling security
DDOSs-related attacks. breaches.
MIT International Journal of Computer Science & Information Technology Vol. 1, No. 1, Jan. 2011, pp. 1-7 4
ISSN 2230-7621 (Print Version) 2230-763X (Online Version) MIT Publications

A companys security policy should be at the centre of all policies. They should also ensure any e-marketing policies
security issues, both inside and outside the company. In the company may have are protected (McGivern et al.,
addition, security policies are important to assure proper 2002; Smith, 2002). Managers must be able to closely work
implementation of control. Since a single document for all with IT personnel i n conveying such needs to implement
security policies may be unmanageable, security policies an Information Security Management System (ISMS).
should be made up of multiple documents. Security
policies should be defined by a firms customers.
2.4 BUDGETING FOR E-SECURITY
The security policy on software installation should
clearly define the employees software installation rights. Budgeting for e-security is very important to an entitys
It should define the correct procedures for obtaining long-term s ur vi val and competitiveness. Governmental
permission to have programs installed and the security and corporate agencies spend most of their IT security
criteria each piece of software must meet. budgets on firewalls and virtual private networks that
provide secure connections between remote users and
A security policy may be developed in a number of
central corporate networks (Roberts, 2002).
stages. One obvious first step involves scope and objectives
for the policy document, which must be established early There are many factors that go into understanding and
in its development. Next, defining what policies need to calculating the total cost of ownership in e-security
be written, followed by a risk assessment and analysis, and systems. Effort should be taken to identify all-important
typically performed by an outside auditor. Security policies assets, both tangible and intangible. Important IT assets
should ensure that state and Federal regulations are being may include firewalls, e-mail, Web and data servers,
followed with reference to handling private and personal routers, funds for equipment warranties, annual
information. subscription for perimeter scans, and salaries for IT
personnel, training, and analysis and audit tools
(Campbell and McCarthy, 2001). Actual costs for
2.3 MANAGEMENT SUPPORT ISSUES maintaining offsite data storage should also be
Management support for a security policy is crucial. calculated.
Management must participate in and fully support the Another important factor in creating a security budget is
security policies that have been put in place. The problem to identify the costs of rectifying vulnerabilities and
in most companies to d a y is that security is looked upon comparing them to the costs to repair the network or Web
as an overhead expense that may be cut or downsized, site from a successful attack that has destroyed d ata ,
especially in times of economic hardships. Managements stolen data or rendered the network inoperative.
goal should be to make employees and customers an
In order to help in budgeting and reducing costs,
integral part of the solution. Governmental and
management may choose to allocate expenditures across
corporate agencies must understand that people may be
the entire enterprise. This may help in network planning
the greatest asset to security, but are a potential weak link
by allowing governmental and corporate agencies the
as well. In many companies, managers make everyone
ability to monitor the usage rates of the network by
responsible for their own security. If different
various users, workgroups, or departments. The costs for
departments use different standards then this could lead to
maintaining, upgrading, and security are then
interoperability problems b etween departments. A
distributed within departments across the entire
companys security must start at the top of the company,
enterprise. In a well-defined budget, whic h is supported
this means from the CEO on down to the lowest level
by the e-security policies and management, IT personnel
employee.
ma y purchase technology and software that have
Management should be responsible for making people sufficient security features built into them.
part of the solution, which means that management must
be made an integral part of security. Management should
understand that security requires them to show the same 2.5 HARDWARE AND SOFTWARE
leadership initiatives as they do with other parts of the In order to identify vulnerabilities in the hardware and
business that have a direct bearing on profitability. software, companies must do periodic vulnerability
Unfortunately, many managers cringe at the thought of scanning. Vulnerability scanning will help reveal
having to deal with the technology, especially when weaknesses in firewalls, routers, e-mail, Web, data, and
dealing with e-security issues, but they must realize that e-commerce servers. An example of hardware
they do not need to have a detailed working knowledge of vulnerability is the exposure of routers and switches,
how the technology works to effectively management it. which have the same internal software and hardware
Management needs to ensure that the business processes configurations, to attack. These devices are generally
are protected, not hindered by e-security measures, in used to control the traffic on a network. They may be
order to pursue sound business procedures, practices, and used as firewalls by being able to filter out various types of
MIT International Journal of Computer Science & Information Technology Vol. 1, No. 1, Jan. 2011, pp. 1-7 5
ISSN 2230-7621 (Print Version) 2230-763X (Online Version) MIT Publications

traffic over the Internet. This adds an extra layer of 2.6 EMPLOYEES AS A SECURITY LOOP HOLES
hardware p r o tectio n to a network. However, routers
As illustrated in Fig.1, the contributions of employees
and switches user name and password security features
are essential to the overall effectiveness of an e-security
that allow remote access for configuration may be
program. Employees must be empowered with proper
compromised if IT personnel forget to change the
training and resources to be able to know what to do in
default user name and password. A cracker only has to
case of an attack or threat. Unfortunately, many major
know the default password for a particular brand of device
system breaches are due to the actions of a few employees
to go in and reconfigure the device to allow them access.
that inadvertently give out their password to the wrong
Software will continue to play a dominant role in e- party.
security. Organizations may have several network
It is managements responsibility to set aside time and
operating systems, such as Windows, Unix, Novell
resources for the employees to be trained. The regular
Netware, and Linux running on their networks
employees usually do not have expert computer training
simultaneously. Very rarely do business entities use only
in terms of e-security matters. They may only know just
one network operating system for their entire network.
enough about an electronic information system to get
Network operating systems include software that enables
their daily work done. They may not be technically
network servers to share resources with clients. They also
familiar with how network protocols work, what methods
handle things such as, communications, security, and
crackers may use to gain access to the companys
user management within a network infrastructure.
networks, or how viruses may be spread.
Network operating systems may also be responsible for
data storage, file and print sharing, and data backup and Many companies are dependent on communication
recovery. Each type of operating system has its own set devices for keeping the information flowing and
of defaults when installed. In general, these default providing metrics for operational effectiveness. With the
settings are available to the public. In many cases it is overwhelming amount of computers in workplace some
these default settings that a cracker will exploit to gain type of automatic identification and data capture
access to a network. It is up to network administrators to system is necessary to ensure the level of accuracy
pick operating systems that provide security features and needed to support managerial decision-making systems
services as suggested in the security policy; and they must (Smith and Faley, 2001, p. 8). Many governmental and
have a clear understanding of how the operating systems corporate agencies claim the need for surveillance is to be
work in order to configure them properly. able to monitor its products in terms of both the
employee and the customer to enable better delivery of
Another possible security flaw is combining mo r e than
products and services. For example, Companies may
one network operating system on a network. Network
gain significant advantage b y utilising their information
administrators must ensure that the services running o n
infrastructures for communication purposes (Smith and
the networks that provide interoperability among the
Faley, 2001, p. 9). One of the primary reasons for
various network operating systems are secure.
monitoring employee activity is to ensure that the
Essentially all software, whether it is the network
employees are using the network infrastructure for work
operating systems application software or embedded in
purposes only. There have been a number of cases in
network protocols, should be installed in accordance with
recent history were employees have access to illegal Web
governmental and corporate agencies security policies.
sites from their company computers. Employees could
IT personnel should be aware of published security flaws,
also be using company resources to download programs
such as back doors, in the programs and keep the
and other questionable material that could possibly
programs up to date with patches or software fixes supplied
contain viruses.
by the software vender. An outside auditor sho uld audit a
companys network regularly to ensure that there are no
flaws in its security features. 2.7 SECURED SYSTEM OUTCOMES
Every computer in a network should have antiviral Each one of the elements of the model presented in Fig.1
software installed on it. The antiviral software should fit should work together to create layered security barriers to
the network environment it routinely operates in. An the ever-constant threat of cyber criminals. Although it is
antiviral program should be updated on a regular basis to impossible to totally secure information, information is
ensure that its virus definitions are current, so that it is money and a business entity cannot afford to take short
configured correctly in order to balance the need for cuts when it comes to e-security. To understand the
protection against the need for network performance. driving force behind the major forces presented in Fig.1,
Antivirus software should not be able to be altered by an understanding of consequential theory is necessary.
users. Employees must be properly trained how to use it
In terms of utilitarianism, a person should always act so
and understand the security procedures outlined in the
as to produce the greatest ratio of good to evil for
security policy.
everyone concerned with the individuals decision.
MIT International Journal of Computer Science & Information Technology Vol. 1, No. 1, Jan. 2011, pp. 1-7 6
ISSN 2230-7621 (Print Version) 2230-763X (Online Version) MIT Publications

Utilitarianism is rooted in that an action is right if it leads security blanket in governmental and corporate agencies
to the greatest good for the greatest number or the least information infrastructure. A company should look at
possible balance of bad consequences (Beauchamp and electronic information security as a valuable strategic asset
Bowie, 1983); in other words the greatest good for the that is valuable, imitable, and non- substitutable. Security
greatest number. Utilitarian theory essentially proposes should be integrated into an organisations culture, not
that an individual should evaluate all outcomes of an simply placed as an add-on. It should hold the same
action/inaction and weigh them one against another t o importance that every other business decision entails.
determine what is best for society in terms of its social
consequences (Reidenbach and Robin, 1990). The two
types of utilitarianism include act utilitarianism and rule
utilitarianism. Act utilitarianism contends that in every
REFERENCES
situation one ought to act to maximize the total good, [1] Arnett, K.P. and Liu, C. (2002), Raising a red flag on global WWW
even if the rules are violated. Rule utilitarianism contents privacy policies, Journal of Computer Information Systems, Vol. 43
that a person will act consistently in different situations No. 1, pp. 117-28.
based on a set of rules. Utilitarianism does have [2] Ashein, G.B. and Buchholz, W. (2003), The malleability of
weaknesses in its application to e-security behaviorisms. undiscounted utilitarianism as a criterion of intergenerational justice,
Both act and rule utilitarianism ignore actions that Economica, Vol. 70 No. 279, pp. 405-23.
appear to be morally wrong and the principle of utility [3] Barman, S. (2002), Writing Information Security Policies, New Riders
may come into conflict with that of justice. Lastly, it is Publishing, Indianapolis, IN. Beauchamp, T.L. and Bowie, N.E. (1983),
very difficult to formulate satisfactory rules for rule Ethical Theory and Business, 2nd ed., Prentice-Hall, Englewood Cliffs,
utilitarianism. Utilitarianism also has some major NJ Bensaou, M. and Earl, M. (1998), The right mindset for managing
information technology, Harvard Business Review, Vol. 76 No. 5, pp.
strength in evaluations success of programs in e-security. 119-28.
It provides a good basis for formulating and testing
polices and can be used as a guiding principle for [4] Burke, L.A. and Witt, L.A. (2000), Selecting high-performing
legislation. information technology professionals, Journal of End User Computing,
Vol. 14 No. 4, p. 37.
Employees may either make a decision to follow the
security policy guidelines and benefit the company as a [5] Campbell, S. and McCarthy, M.P. (2001), Security Transformation,
McGraw-Hill/Irwin, Boston, M.A. Cheng, H., Chou, D.C., Lin, B. and
whole or they may try to subvert them and employ what Yen, D.C. (1999), Cyberspace Security Management, Industrial
specific actions that they think will best benefit them. Management & Data Systems, Vol. 99 No. 8, pp. 353-64.
This is where management needs to use the security
[6] Hopwood, W.S., Sinason, D. and Tucker, R. (2000), Security in a
policy to enforce the rules and make employees Web-based Environment, Managerial Finance, Vol. 26 No. 11, pp. 42-
understand that they are the key to a companys 57.
information security infrastructure. They are not just
working for the greater good of the company, b ut also [7] Karsten, R. (2002), An analysis of IS professional and end user causal
attributions for user-system outcomes, Journal of End User Computing,
for themselves because it is also their information and Vol. 14 No. 4, pp. 51-73.
jobs that are at stake if an attacker hits the company.
More secured information is the end result of the e- [8] Knyght, P.R., Korac-Kakabadse, A., Korac-Kakabadse, N. and
Kouzmin, A. (2000). The impact of information technology on the
security model presented in Fig.1. Information may never ethics of public sector management in the third millennium, Global
be fully secured from attacks, but with the elements of Virtue Ethics Review, Vol. 2 No. 1, pp. 77-84.
the model working together for the greater good of the
company, e-security will continually improve and adjust [9] McGivern, E., Saban, K. and Saykiewiez, J.N. (2002), A critical look
at the impact of cybercrime on consumer Internet behaviour, Journal of
to the evolution of cyber attacks as a whole. Marketing Theory and Practice, Vol. 10 No. 2, pp. 29-37.

[10] Murphy, S.D. (2001), Adoption of convention on cybercrime, The


3. CONCLUSION AND IMPLICATION American Journal of International Law, Vol. 95 No. 4, pp. 889-91.
As stated earlier, the purpose of this paper was to develop [11] Parker, R. (2003), How to profit by safeguarding privacy, Journal of
a conceptual model that illustrated the basic elements and Accountancy, Vol. 195 No. 5, pp. 47-52.
processes governmental and corporate agencies need to
[12] Reidenbach, R. and Robin, D. (1990), Toward the development of a
achieve for a more secured information environment. The multidimensional scale for improving evaluations of business ethics,
struggle for protecting company data will eventually come Journal of Business Ethics, Vol. 9 No. 8, pp. 639-53.
down to who is more motivated to win the battle for [13] Roberts, M. (2002), Guarding the electronic gates, Chemical Week,
information, the organisation or the attacker. Information Vol. 20 No. 27, pp. 41-2.
security in a networked wor ld takes much more than just
[14] Smith, A.D. (2002), Loyalty and e-marketing issues: customer
technology and a few written policies. It takes many retention on the Web, Quarterly Journal of E-commerce, Vol. 3 No. 2,
elements working together in harmony to form a layered pp. 149-61.
MIT International Journal of Computer Science & Information Technology Vol. 1, No. 1, Jan. 2011, pp. 1-7 7
ISSN 2230-7621 (Print Version) 2230-763X (Online Version) MIT Publications

[15] Smith, A.D. (2003), Surveying practicing project managers on Information Management & Computer Security, Vol. 10 No. 4, pp.
curricular aspects of project management programs: a resource-based 178-83.
approach, Project Management Journal, Vol. 34 No. 2, pp. 26-33.
[16] Smith, A.D. and Faley, R.A. (2001), E-mail workplace privacy issues [20] Smith, A.D. and Rupp, W.T. (2002c), Examination of the
in an information- and knowledge-based environment, Southern interrelationships between the Internet and religious organisations: an
Business Review, Vol. 27 No. 1, pp. 8-19. application of diffusion theory, Services Marketing Quarterly, Vol. 24
No. 2, pp. 29-41.
[17] Smith, A.D. and Offodile, F. (2002), Information management
of automated data capture: an overview of technical developments, [21] Swanson, E.B. (1994), Information systems innovation among
Information Management & Computer Security, Vol. 10 No. 3, pp. organizations, Management Science, Vol. 40 No. 9, pp. 1069-92.
109-18. [22] Tuthill, M. (2001), E-risk is a manageable beast, AFP Exchange, Vol.
[18] Smith, A.D. and Rupp, W.T. (2002a), Application service providers 21 No. 3, pp. 52-6.
(ASP): moving downstream to enhance competitive advantage, [23] Wong, A. and Beckman, E. (1992), An applied ethical analysis system
Information Management & Computer Security, Vol. 10 No. 2, pp. 64- in business, Journal of Business Ethics, Vol. 11 No. 3, pp. 173-9.
72.
[24] E-security issues and policy development Alan D. Smith Aslib
[19] Smith, A.D. and Rupp, W.T. (2002b), Issues in cyber security: Proceedings: New Information Perspectives Volume 56 Number 5
understanding the potential risks associated with hackers/ crackers, 2004 272-285

You might also like