21 |
Privacy policies and practices: an investigation of secondary use of information within South African retail banking institutionsDaya, Jithendra Chotoo January 1996 (has links)
A research report submitted to the Faculty of Commerce, University of the Witwatersrand, Johannesburg, in the partial fulfilment of the requirements for the degree of Master of Commerce. Johannesburg 1996. / This paper addresses concerns surrounding information privacy and the secondary use of
information in South African corporations. This study also attempts to assess the level of
concern that management and information technology practitioners if! South African retail
banks have about privacy issues.
The research suggests that privacy is a huge concern internationally and may affect South
African corporations if they do not follow certain policies and practices. Eleven in-person
structured interviews were conducted at four banks.
The research proposes a set of guidelines by which South African management and IT
practitioners, who are involved with the identification and solution of some of the problems
that may be presented by possible privacy legislation, will be able to assess their policies and
practices against international practices and policies. The results inform IS managers and
executives about appropriate business policies they can implement voluntarily to address
public concerns about specific information practices that may be considered a threat to
privacy.
The findings suggest that the executives are deliberately avoiding confronting the issue of
information privacy for as long as possible. The executives are adopting a wait-and-see
attitude and will react 011 whatever legislation requires them to do. At the time of the
report senior executives at banks were not accepting responsibility for information privacy
policies and practices and were leaving this responsibility; to the middle level managers who implement their own practices based on their own needs. / GR2017
|
22 |
Data security and data independence in a mobile military systemAkins, William Paul January 2010 (has links)
Photocopy of typescript. / Digitized by Kansas Correctional Industries
|
23 |
Department of Defense computer network security : an assessment of the state of the artScharf, James David January 2010 (has links)
Photocopy of typescript. / Digitized by Kansas Correctional Industries
|
24 |
Legal requirements of secure systemsBeckman, Joseph M January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
25 |
Privacy and security of an intelligent office formLee, Kum-Yu Enid January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
|
26 |
Security of distributed data systemsFinch, Steven D. January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
27 |
Designing and implementing a network authentication service for providing a secure communication channelChance, Christopher P January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
|
28 |
Non-discretionary access control for decentralized computing systems.Karger, Paul Ashley January 1977 (has links)
Thesis. 1977. M.S.--Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING. / Bibliography : leaves 131-139. / M.S.
|
29 |
A study of the computer systems development process of a large private company /Li, Kwok-hung. January 1983 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1983.
|
30 |
Navy Marine Corps Intranet : an analysis of its approach to the challenges associated with seat management contracting /Bullock, Kenneth F. January 2003 (has links) (PDF)
Thesis (M.S. in Contract Management)--Naval Postgraduate School, June 2003. / Thesis advisor(s): Ron B. Tucker, Peter J. Proko. Includes bibliographical references (p. 89-90). Also available online.
|
Page generated in 0.1342 seconds