An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management

被引:0
|
作者
Mubarak, Sameera [1 ]
Slay, Jill [2 ]
机构
[1] Univ South Australia, Sch Comp & Informat Sci, SM 1-20,27 N Terrace,GPO Box 2471, Adelaide, SA 5001, Australia
[2] Univ South Australia, Adv Comp Res Ctr, Sch Comp & Informat Sci, Adelaide, SA 5095, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer crimes have affected almost all sectors of international business. The legal sector is no exception to this trend. In recent years legal firms have reported many kinds of computer crime. One particular area that has attracted attention is the security of trust accounts operated within law firms. This paper examines the purpose of trust accounts within law firms, the ways in which they are vulnerable to abuse through computer crime and the ways in which the ICT industry can promote their security.
引用
收藏
页码:55 / +
页数:3
相关论文
共 50 条
  • [21] Study on Chaotic Theory in An Information Security Management Approach
    Ji, Zhigang
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 1976 - 1980
  • [22] Study of Security of Material Information Management based on XML
    Yu, Su
    Azar, Ghassan M.
    INDUSTRIAL DESIGN AND MECHANICAL POWER, 2012, 224 : 444 - +
  • [23] A Study on Comparative Analysis of the Information Security Management Systems
    Jo, Heasuk
    Kim, Seungjoo
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 510 - 519
  • [24] A study on comparative analysis of the information security management systems
    Information Security Group, School of Information and Communication Engineering, Sungkyunkwan University, 300 Chunchun-dong, Suwon 440-746, Korea, Republic of
    Lect. Notes Comput. Sci., PART 4 (510-519):
  • [25] A Case Study on Risk Management of Enterprise Information Security
    Huang, Rengen
    Zhu, Zhen
    2015 2nd International Conference on Creative Education (ICCE 2015), Pt 2, 2015, 11 : 201 - 208
  • [26] A study on the optimal model for information security management level
    Cho, Kyong Ho
    Lee, Dong Hwi
    Kim, Jeom-Goo
    Lee, Cheol-Won
    Seo, Hyung-Jun
    Kim, Kuinam J.
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 238 - +
  • [27] Information security seminar: Information security and the law seminar; Stirling university management centre, tuesday 23rd April 2002
    Foggon, Keith
    Computer Law and Security Report, 2002, 18 (05):
  • [28] Does the PCEHR mean a new paradigm for information security? Implications for health information management
    Williams, Patricia A. H.
    HEALTH INFORMATION MANAGEMENT JOURNAL, 2013, 42 (02) : 31 - 36
  • [29] SPTM: A Security Protocol for Protecting the P2P Trust Information Management
    Hu, Jianli
    Wu, Quanyuan
    Zhou, Bin
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 56 - 60
  • [30] ROLE AND MEANING OF INFORMATION RESOURCES WITHIN FINANCIAL SECURITY MANAGEMENT SYSTEM FOR A TERRITORY
    Smyrnov, S. M.
    ACTUAL PROBLEMS OF ECONOMICS, 2010, (112): : 261 - 265