Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
There has always been some degree of controversy surrounding computers and computers have always been vulnerable. In the early days of computing there were cases of theft and criminal damage to new computer installations. Computers have been shot at and even bombed, causing extensive damage.Over the years there have been many attempts at computer fraud. One of the most celebrated was the so-called Salami Fraud where small amounts of money, which would be hardly noticed by any individual, were taken from a very large number of bank accounts, thus enriching the fraudsters. However, these were largely limited to corporate situations where the damage was contained. With the arrival of the personal computer and especially mobile devices such as laptops and smart phones the damage achievable by fraudsters and vandals and others wishing to inflict damage on elements of cyberspace has grown and a considerable number of people have had a lot of money swindled from them. In a similar vein computers are now also used as weapons to target other computers and electronic devices.The past 20 years has seen a massive escalation in the damage done in cyberspace and this has been accompanied by a growing concern about all aspects of Cyber Security. The ever increasing number of cyber attacks on individuals, organisations and national government agencies has reached epidemic proportions. It is not possible to know the exact extent of these attacks and the damage which they have done as no one wishes to advertise their vulnerability - even their past vulnerability. However, estimates suggest that the cost of these attacks have run into tens or even hundreds of billions of dollars. What is certain is that billions of dollars are being spent every year in order to improve cyber security.
Shows how to go about justification for IT spend. This book is designed for those who are involved in the decision to invest in information systems; and is relevant to business executives, financial managers and IT executives. It shows how to create a list of outcomes or benefits, their metrics, measuring methods and responsibility points.
Talking about information systems development failures and how to avoid them, this book considers what goes wrong with information systems development projects and what actions may be taken to avoid potential difficulties. It helps to ensure that IS project managers are successful in helping to deliver application systems.
Doing Research in Business and Management provides a comprehensive overview of management research and research methodology. Taking the reader through all the major stages of the research process, this wide-ranging text introduces the key methods that are available to students as researchers in management and business.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.