Abstract | ||
---|---|---|
The wide use of personal computers and general access to telecommunications links have intensified the need for computer security. Security practices as discussed in this paper relate to protecting an organization's personal computers as physical property, protecting the organization's data and applications, and protecting the organization itself. These matters are discussed from the point of view of protection from the improper use of personal computers. |
Year | DOI | Venue |
---|---|---|
1984 | 10.1147/sj.233.0297 | IBM Systems Journal |
Keywords | Field | DocType |
wide use,improper use,security practice,physical propedy,personal computer,security consideration,general access,telecommunications link,computer security | Computer security,Engineering,Personal information manager | Journal |
Volume | Issue | ISSN |
23 | 3 | 0018-8670 |
Citations | PageRank | References |
2 | 2.29 | 8 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
W. H. Murray | 1 | 39 | 15.16 |