{"title":"Securing information infrastructure from information warfare","authors":"S. Sharma, J. Gupta","doi":"10.1108/09576050210447118","DOIUrl":"https://doi.org/10.1108/09576050210447118","url":null,"abstract":"The growing dependence on the Internet and related technologies has led to the creation of a new type of warfare, “information warfare” (infowar) which is based on attacking and infiltrating opposing information infrastructures. The chances of information infrastructures being subjected to attacks have increased correlatively with the growth of networked, multinational organizations and e‐commerce. Although challenging, it is becoming extremely important to protect and safeguard information infrastructures from any attack. Info‐war is definitely a concern for most nations due to increased susceptibility of information systems to perpetrators. Many nations have confirmed that their information systems have already been successfully penetrated, introducing a unique and potentially devastating twenty‐first century threat. Discusses the types of info war attacks, proposes a framework for identifying various zones where the info war attack could create damage to information infrastructures, and suggests some mechanisms to safeguard against the info war attacks.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116782570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information security for agent‐based WWW medical information retrieval","authors":"S. Walczak","doi":"10.1108/09576050210447082","DOIUrl":"https://doi.org/10.1108/09576050210447082","url":null,"abstract":"Electronic information retrieval is becoming a necessity for most businesses, including medical practice. Agent technology promises to provide a facile means for intelligently searching the Internet. However, any agent or other electronic information placed onto the Internet poses a security risk. Encryption and firewalls are traditional methods for increasing Internet information security, but are these techniques sufficient to protect adequately electronic information carried by Internet agents? Need to know and partial information strategies are discussed as methods for improving information security for Internet agents.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128851311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An information security meta‐policy for emergent organizations","authors":"R. Baskerville, M. Siponen","doi":"10.1108/09576050210447019","DOIUrl":"https://doi.org/10.1108/09576050210447019","url":null,"abstract":"There is an increasing movement towards emergent organizations and an adaptation of Web‐based information systems (IS). Such trends raise new requirements for security policy development. One such requirement is that information security policy formulation must become federated and emergent. However, existing security policy approaches do not pay much attention to policy formulation at all – much less IS policy formulation for emergent organizations. To improve the situation, an information security meta‐policy is put forth. The meta‐policy establishes how policies are created, implemented and enforced in order to assure that all policies in the organization have features to ensure swift implementation and timely, ongoing validation.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131464743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security practice: survey evidence from three countries","authors":"M. Warren","doi":"10.1108/09576050210447028","DOIUrl":"https://doi.org/10.1108/09576050210447028","url":null,"abstract":"Computer security is becoming a global problem. Recent surveys show that there increased concern about security risks such as hackers. There is also an increase in the growth of Internet access around the world. This growth of the Internet has resulted in the development of new businesses such as e‐commerce and with the new businesses come new associated security risks such as on‐line fraud and hacking. Is it fair to assume the security practices are the same all over the world? The paper tries to look at security practices from a number of different countries perspective and tries to show that security practices are not generic and vary from country to country.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114443806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges of implementing public key infrastructure in Netcentric enterprises","authors":"Sunil Hazari","doi":"10.1108/09576050210447073","DOIUrl":"https://doi.org/10.1108/09576050210447073","url":null,"abstract":"The explosive growth of e‐commerce has resulted in organizations sharing data over the Internet with other Netcentric organizations. Advances in telecommunications and networked applications are forcing dramatic changes in corporate functions, such as supply chain management, enterprise resource planning and customer relationship management. Online transactions with business partners and customers has prompted e‐businesses to re‐evaluate their security strategy, to avoid network downtime and being unable to connect to upstream partners and suppliers. Presence of a robust security architecture is essential to the success of netcentric organizations. Public key infrastructure (PKI) is one such technology that may offer benefits to Netcentric organizations, being a system of services, technology, protocols and standards that can be used as a solution for providing secure transactions. There are many factors that make PKI implementation difficult. This paper provides an overview of PKI technology, insight into challenges, as well as impact of implementing PKI in Netcentric organizations.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concepts in information warfare","authors":"W. Hutchinson","doi":"10.1108/09576050210447109","DOIUrl":"https://doi.org/10.1108/09576050210447109","url":null,"abstract":"This paper examines the fundamental concepts needed to understand the broad spectrum of activities encompassed by the information warfare phenomenon. It provides a theoretical background to these activities, and examines the social context in which these are most effective.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"222 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114166691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A prototype tool for information security awareness and training","authors":"S. Furnell, M. Gennatou, P. Dowland","doi":"10.1108/09576050210447037","DOIUrl":"https://doi.org/10.1108/09576050210447037","url":null,"abstract":"Information systems security is a critical issue for all organisations with a significant dependence upon information technology. However, it is a requirement that is often difficult to address, particularly within small organisations, as a result of a lack of resources and expertise. This paper identifies the need for security awareness and describes the prototype implementation of a software tool that enables individuals to pursue self‐paced security training. The tool provides an environment that permits the user to simulate the introduction of security into a number of pre‐defined case study scenarios. This enables staff to become familiar with the types of countermeasures available, the situations in which they are appropriate and any constraints that they may impose. This would be particularly valuable in small organisations where specialist knowledge is often scarce and issues need to be addressed by existing staff.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer viruses: a quantitative analysis","authors":"A. Coulthard, T. Vuori","doi":"10.1108/09576050210447091","DOIUrl":"https://doi.org/10.1108/09576050210447091","url":null,"abstract":"This paper provides interesting insights for anti‐virus research, as it reflects a period of rapid uptake in the application of the Internet and the use of e‐mail for business purposes. The purpose of the research is to provide independent justification of the growing prevalence of computer virus incidents over the past five years, and identify patterns in the frequency and distribution of computer viruses. Specifically, the analysis focuses on examining the claims that computer viruses are increasing in prevalence, that computer viruses follow an evolutionary pattern and that seasonality exists in the distribution of computer viruses.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128691083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT/IS projects selection using multi‐criteria utility theory","authors":"R. Stewart, S. Mohamed","doi":"10.1108/09576050210436101","DOIUrl":"https://doi.org/10.1108/09576050210436101","url":null,"abstract":"In recent years, there has been a growing awareness that most decision makers are not only concerned with the financial implications of information technology/system (IT/IS) projects, but they are also concerned with other objectives such as competitive advantage, market share and future growth. Nowadays, multi‐criteria decision‐making methods are gaining importance due to their inherent ability to judge different alternative scenarios for possible selection of the best alternative. This paper provides a decision‐making framework for senior executives when selecting innovative IT/IS projects. The proposed framework is based on the multi‐criteria utility theory (MCUT) combined with information economics principles to select IT/IS project(s) based on “business value” and “risk” criteria. MCUT has the advantage of taking into consideration the decision maker’s preferences in the form of utility functions defined over a set of tangible and intangible criteria. To illustrate the application of the proposed framework, a hypothetical case study is provided, where input elicited from four engineering professionals is used to develop utility functions for a predefined set of selection criteria.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125660377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A generic tool for the selection and management of supplier relationships in an outsourced manufacturing environment: the application of case based reasoning","authors":"K. Choy, W. B. Lee","doi":"10.1108/09576050210436093","DOIUrl":"https://doi.org/10.1108/09576050210436093","url":null,"abstract":"Many companies that were once centrally involved in the actual manufacture of products, and the delivery of their supporting services, now find themselves primarily engaged in integrating a number of other organizations, some of which they may own but many of which will be independent, each of which goes to make up a particular supply network. Consequently, continuously tracking performance of suppliers and an appropriate selection mechanism is one of the crucial activities in managing this supply network. This paper presents an intelligent generic supplier management tool (GSMT) using the case‐based reasoning (CBR) technique for outsourcing to suppliers and automating the decision‐making process when selecting them. The development of GSMT and how the CBR technique is applied is then given, followed by an application of GSMT in Honeywell Consumer Products (Hong Kong) Limited.","PeriodicalId":296825,"journal":{"name":"Logistics Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}