An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management

被引:0
|
作者
Mubarak, Sameera [1 ]
Slay, Jill [2 ]
机构
[1] Univ South Australia, Sch Comp & Informat Sci, SM 1-20,27 N Terrace,GPO Box 2471, Adelaide, SA 5001, Australia
[2] Univ South Australia, Adv Comp Res Ctr, Sch Comp & Informat Sci, Adelaide, SA 5095, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer crimes have affected almost all sectors of international business. The legal sector is no exception to this trend. In recent years legal firms have reported many kinds of computer crime. One particular area that has attracted attention is the security of trust accounts operated within law firms. This paper examines the purpose of trust accounts within law firms, the ways in which they are vulnerable to abuse through computer crime and the ways in which the ICT industry can promote their security.
引用
收藏
页码:55 / +
页数:3
相关论文
共 50 条
  • [1] Sousveillance Implications for privacy, security, trust, and the law
    Michael, Katina
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2015, 4 (02) : 92 - 94
  • [2] Exploring Trust and Information Monitoring for Information Security Management
    Chang, Shuchih Ernest
    Liu, Anne Yenching
    Jang, Yu-Teng Jacky
    2017 10TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI), 2017,
  • [3] Smartphone security: understanding smartphone users' trust in information security management
    Jang, Yu-Teng
    Chang, Shuchih Ernest
    Tsai, Yi-Jey
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1313 - 1321
  • [4] Trust Account Fraud and Effective Information Security Management
    Mubarak, Sameera
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2010, 5 (03) : 57 - 71
  • [5] Study of orgware for information security management
    Zhang, LT
    Cheng, JM
    Qian, XS
    PROGRESS IN SAFETY SCIENCE AND TECHNOLOGY, VOL V, PTS A AND B, 2005, 5 : 464 - 469
  • [6] Study on Information Security of Industry Management
    Li Xuemei
    Li Yan
    Ding Lixing
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 1, PROCEEDINGS, 2009, : 522 - +
  • [7] Survey of information and knowledge management in South African law firms
    du Plessis, T.
    du Toit, A. S. A.
    SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT, 2005, 7 (01):
  • [8] A Potential Loss of Trust as a Result of the Conflicting Messages within Information Security Research
    Oost, Daniel
    PROCEEDINGS OF THE 2010 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY: SOCIAL IMPLICATIONS OF EMERGING TECHNOLOGIES, 2010, : 213 - 219
  • [9] Computer forensics, information security and law: A case study
    Herath, A
    Herath, S
    Samarasinghe, P
    Herath, J
    Herath, S
    FIRST INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2005, : 135 - 141
  • [10] A Study of Resilience within Information Security in the Power Industry
    Line, Maria B.
    AFRICON, 2013, 2013, : 420 - 425