Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

The Information Security Ownership Question In Iso/Iec 27001 – An Implementation, Lizzie Coles-Kemp, Richard E. Overill Dec 2006

The Information Security Ownership Question In Iso/Iec 27001 – An Implementation, Lizzie Coles-Kemp, Richard E. Overill

Australian Information Security Management Conference

The information security management standard ISO/IEC 27001 is built on the notion that information security is driven by risk assessment and risk treatment. Fundamental to the success of risk assessment and treatment is the decision making process that takes risk assessment output and assigns decisions to this output in terms of risk treatment actions. It is argued that the effectiveness of the management system lies in its ability to make effective, easytoimplement and measurable decisions. One of the key issues in decision making is ownership. In this paper two aspects of information security ownership are considered: ownership of the asset …


Mapping The Consensual Knowledge Of Security Risk Management Experts, David J. Brooks Dec 2006

Mapping The Consensual Knowledge Of Security Risk Management Experts, David J. Brooks

Australian Information Warfare and Security Conference

The security industry comprises of diverse and multidisciplined practitioners, originating from many disciplines. It has been suggested that the industry has an undefined knowledge structure, although security experts contain a rich knowledge structure. There has also been limited research mapping security expert knowledge structure, reducing the ability of tertiary educators to provide industry focused teaching and learning. The study utilized multidimensional scaling (MDS) and expert interviews to map the consensual knowledge structure of security experts in their understanding of security risk. Security risk concepts were extracted and critiqued from West Australian university courses. Linguistic analysis categorised the more utilized security …


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael Dec 2006

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Landscape Use And Movements Of Wolves In Relation To Livestock In A Wildland–Agriculture Matrix, Andreas S. Chavez, Eric M. Gese Aug 2006

Landscape Use And Movements Of Wolves In Relation To Livestock In A Wildland–Agriculture Matrix, Andreas S. Chavez, Eric M. Gese

USDA Wildlife Services: Staff Publications

Wolves (Canis lupus) have expanded their distribution into areas of the midwest United States that have not had wolves for several decades. With recolonization of wolves into agricultural areas, there is increasing concern of wolf–livestock conflicts. To assess the risk wolves may pose to livestock, we initiated a 3-year study investigating the activity patterns, movements, habitat use, visitation to livestock pastures by wolves, and the occurrence of depredation events in an agricultural–wildland matrix in northwestern Minnesota, USA. From June 1997 to November 1999, we captured 23 wolves, including pups, from 3 packs; we radio-collared 16 of these wolves. …


Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan Jan 2006

Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan

Journal of Digital Forensics, Security and Law

Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …


The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas Jan 2006

The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas

Faculty of Informatics - Papers (Archive)

This paper examines the threat of freely available information on critical infrastructure protection (CIP) efforts. Critical infrastructure are the services required to maintain the stability and security of a country, and comprise both physical and cyber infrastructures. These interdependent entities must be protected from natural disasters, accidental errors, and deliberate attacks. The CIP process typically includes vulnerability assessment, risk assessment and risk management, and has been a global concern for many years; the concern now amplified in Australia due to a number of recent events such the 9/11 attacks, and the Bali bombings. The events have called into question the …


Delineating Hurricane Vulnerable Populations In Orleans Parish, Louisiana, Stephanie Pedro Jan 2006

Delineating Hurricane Vulnerable Populations In Orleans Parish, Louisiana, Stephanie Pedro

LSU Master's Theses

Since settlement first began, equality issues between different social classes have been evident in the location of where residents settled in New Orleans. This research seeks to answer the question: What socioeconomic indicators are prevalent in the areas most-at-risk to flooding which could inhabit populations least able to evacuate? I will use Census 2000 block group data from the socioeconomic sample data (SF3) collected in 2000, along with other economic and GIS data from the New Orleans region to statistically represent the distribution of risk by selecting indicators predicted to be in flood zones from a classification tree analysis. Then, …