Library

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Electronic Resource
    Electronic Resource
    Bingley : Emerald
    Internet research 12 (2002), S. 329-338 
    ISSN: 1066-2243
    Source: Emerald Fulltext Archive Database 1994-2005
    Topics: Computer Science
    Notes: Previous studies have identified significant disparity in the levels of Internet access availability in different countries, particularly in developing nations. This paper presents the findings of an investigation into Internet connectivity and usage in different countries, in an attempt to determine the extent of Internet access, and whether the availability of such technology is considered to be beneficial. This research considers indicators such as available technology infrastructure and access costs, in order to identify the varying limitations that may be faced in different countries across continents. In addition, the opinions of individuals were sought regarding their typical access methods and level of Internet access, typical services utilised, and the general impact Internet has had upon their activities. A Web-based questionnaire was used to elicit comments from 152 respondents from 19 countries, yielding preliminary statistical data to enable the assessment of Internet usage in different countries.
    Type of Medium: Electronic Resource
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISSN: 1066-2243
    Source: Emerald Fulltext Archive Database 1994-2005
    Topics: Computer Science
    Notes: During the dot com era the word "personalisation" was a hot buzzword. With the fall of the dot com companies the topic has lost momentum. As the killer application for UMTS has yet to be identified, the concept of multi-dimensional-personalisation (MDP) could be a candidate. Using this approach, a recommendation of online content, as well as offline events, can be offered to the user based on their known interests and current location. Instead of having to request this information, the new service concept would proactively provide the information and services - with the consequence that the right information or service could therefore be offered at the right place, at the right time. Following an overview of the literature, the paper proposes a new approach for MDP, and shows how it extends the existing implementations.
    Type of Medium: Electronic Resource
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Electronic Resource
    Electronic Resource
    Bingley : Emerald
    Internet research 7 (1997), S. 61-66 
    ISSN: 1066-2243
    Source: Emerald Fulltext Archive Database 1994-2005
    Topics: Computer Science
    Notes: Examines the damaging effects that malicious computer abuse, such as hacking and viruses, can have on the development of an information-based society. Computing and telecommunications technologies are a key ingredient in the realization of this society, but are increasingly the targets of criminals and mischief makers. Highlights the apparent escalation in computer-abuse incidents, as illustrated by a number of recent surveys, and examines the effects that these may have on the public perception of technology (and, hence, the smooth transition to the information society). Also presents some broad recommendations regarding what can be done to address the problem. This considers both technical measures to help safeguard systems and revised attitudes to computer abuse, to insure that incidents can be dealt with more effectively.
    Type of Medium: Electronic Resource
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Electronic Resource
    Electronic Resource
    Bradford : Emerald
    Information management & computer security 8 (2000), S. 65-75 
    ISSN: 0968-5227
    Source: Emerald Fulltext Archive Database 1994-2005
    Topics: Computer Science
    Notes: The detection and prevention of authorised activities, by both external parties and internal personnel, is an important issue within IT systems. Traditional methods of user authentication and access control do not provide comprehensive protection and offer opportunities for compromise by various classes of abuser. A potential solution is provided in the form of intrusion detection systems, which are able to provide proactive monitoring of system activity and apply automatic responses in the event of suspected problems. This paper presents the principles of intrusion monitoring and then proceeds to describe the conceptual architecture of the Intrusion Monitoring System (IMS), an approach that is the focus of current research and development by the authors. The main functional elements of the IMS architecture are described, followed by thoughts regarding the practical implementation and the associated advantages (and potential disadvantages) that this would deliver. It is concluded that whilst an IMS-type approach would not represent a total replacement for conventional controls, it would represent an effective means to complement the protection already provided.
    Type of Medium: Electronic Resource
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Electronic Resource
    Electronic Resource
    Bradford : Emerald
    Information management & computer security 9 (2001), S. 93-101 
    ISSN: 0968-5227
    Source: Emerald Fulltext Archive Database 1994-2005
    Topics: Computer Science
    Notes: Security analyser tools provide a useful means of automatically identifying, and potentially exploiting, vulnerabilities within computer systems and networks but they are also of assistance to hackers looking for ways to break in. The paper highlights the range of tools that are available and of potential use to both audiences and considers the extent to which each group is likely to benefit from them in practice. It is considered that the ease of use of tools such as Back Orifice 2000 provides a means by which even the relatively unskilled hacker may inflict damage upon a system. Although tools are generally equally available to hackers and administrators, the hacker community is likely to be more aware of the opportunities available. Even where adminstrators are aware of the existence of particular tools, survey results indicate that they make relatively limited use of them. Factors that may account for this include their overall workload and lack of security awareness. Appropriate countermeasures can be identified to combat the individual categories of tool, but the problem of ensuring that these safeguards are implemented still remains.
    Type of Medium: Electronic Resource
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...