{"title":"The growing business of chip theft","authors":"Michael McCormack","doi":"10.1016/0142-0496(95)80049-2","DOIUrl":"10.1016/0142-0496(95)80049-2","url":null,"abstract":"<div><p>Chip theft is, without a doubt, the fastest growing area of computer-related crime, causing losses in excess of £200 million to British businesses in 1994. This year, insurance industry watchdogs fear, that figure may double.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Pages 19-20"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80049-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74004003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The ebridge project","authors":"R.P.J. Winsborrow","doi":"10.1016/0142-0496(95)80047-6","DOIUrl":"10.1016/0142-0496(95)80047-6","url":null,"abstract":"<div><p>In many organizations and government administrations, electronic documents are opening the way to faster and more efficient ways of doing business. In fact, electronic information exchange, far from being considered a luxury, is increasingly seen as a staple requirement for survival in today's competitive environment. The increasing use of EDI is a good example of this reality. Another is the development over the past few years of an increasing variety of pan-European information services. The growth in these services is being driven in part by the increasing globalization of trade and by the needs of the Single Market within the European Union. However, the provision of information services on a pan-European basis raises many issues from a security perspective. This article provides an overview of one of these pan-European information services and the steps that have been taken to improve its operational security within the context of the EC-sponsored ebridge project.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Pages 12-15"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80047-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75311291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New intellectual property and the need for information security","authors":"","doi":"10.1016/0142-0496(95)80255-X","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80255-X","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 9","pages":"Pages 18-19"},"PeriodicalIF":0.0,"publicationDate":"1995-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80255-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72267258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}