450 research outputs found

    Governing information security within the context of "bring your own device" in small, medium and micro enterprises

    Get PDF
    Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof

    Law Enforcement Fusion Centers: Cultivating an Information Sharing Environment while Safeguarding Privacy

    Get PDF
    The national network of fusion centers, of which there are currently 78 nationwide, was created in response to the terrorist attacks of September 11, 2001 and continue to play an integral role in contemporary law enforcement. Their mission, put simply, is to facilitate information sharing across disparate agencies and organizations. Despite a significant presence within the law enforcement landscape, fusion centers have received relatively minimal scholarly attention. This limited literature alludes to operational challenges and public concerns that inhibit fusion center effectiveness. More specifically, little information is known about how fusion centers develop relationships with external partners as well as institute mechanisms to safeguard against violations of individual privacy. The present research employs a combination of national survey data and three in-depth case studies of fusion centers in Florida, Nevada, and Michigan to provide initial answers to these questions. Implications for improved policy and practice are discussed

    Governing information security within the context of "bring your own device" in small, medium and micro enterprises

    Get PDF
    Throughout history, information has been core to the communication, processing and storage of most tasks in the organisation, in this case in Small-Medium and Micro Enterprises (SMMEs). The implementation of these tasks relies on Information and Communication Technology (ICT). ICT is constantly evolving, and with each developed ICT, it becomes important that organisations adapt to the changing environment. Organisations need to adapt to the changing environment by incorporating innovative ICT that allows employees to perform their tasks with ease anywhere and anytime, whilst reducing the costs affiliated with the ICT. In this modern, performing tasks with ease anywhere and anytime requires that the employee is mobile whilst using the ICT. As a result, a relatively new phenomenon called “Bring Your Own Device” (BYOD) is currently infiltrating most organisations, where personally-owned mobile devices are used to access organisational information that will be used to conduct the various tasks of the organisation. The use of BYOD in organisations breeds the previously mentioned benefits such as performing organisational tasks anywhere and anytime. However, with the benefits highlighted for BYOD, organisations should be aware that there are risks to the implementation of BYOD. Therefore, the implementation of BYOD deems that organisations should implement BYOD with proper management thereof

    CPA\u27s guide to information security

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1963/thumbnail.jp

    University of Wollongong Postgraduate Calendar 2003

    Get PDF

    AICPA technical practice aids as of June 1, 2014

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2703/thumbnail.jp

    AICPA technical practice aids as of June 1, 2013

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2667/thumbnail.jp
    • …
    corecore