An explorative study on information security of trust accounts within law firms in South Australia: Implications for IT security management

被引:0
|
作者
Mubarak, Sameera [1 ]
Slay, Jill [2 ]
机构
[1] Univ South Australia, Sch Comp & Informat Sci, SM 1-20,27 N Terrace,GPO Box 2471, Adelaide, SA 5001, Australia
[2] Univ South Australia, Adv Comp Res Ctr, Sch Comp & Informat Sci, Adelaide, SA 5095, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer crimes have affected almost all sectors of international business. The legal sector is no exception to this trend. In recent years legal firms have reported many kinds of computer crime. One particular area that has attracted attention is the security of trust accounts operated within law firms. This paper examines the purpose of trust accounts within law firms, the ways in which they are vulnerable to abuse through computer crime and the ways in which the ICT industry can promote their security.
引用
收藏
页码:55 / +
页数:3
相关论文
共 50 条
  • [31] CONSIDERATIONS REGARDING THE IMPLEMENTATION AND CERTIFICATION WITHIN AN ORGANIZATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM
    Purcarea, Anca-Alexandra
    Tiganoaia, Bogdan
    Petrea, Gabriel
    CHANGE MANAGEMENT IN A DYNAMIC ENVIRONMENT, 2011, : 106 - 113
  • [32] THE USE OF BELIEF FUNCTION THEORY WITHIN THE AUDIT OF AN INFORMATION SECURITY MANAGEMENT SYSTEM
    Beranek, Ladislav
    ICT FOR COMPETITIVENESS 2012, 2012, : 17 - 24
  • [33] AN ANALYTICAL STUDY OF INFORMATION SECURITY MANAGEMENT IN THE PUBLIC SECTOR OF ALBANIA
    Kuka, Elda
    CBU INTERNATIONAL CONFERENCE PROCEEDINGS 2018: INNOVATIONS IN SCIENCE AND EDUCATION, 2018, 6 : 277 - 281
  • [34] Study on Efficiency of Risk Management for Information Security Based on Transaction
    Lu, Zhigang
    Wang, Xiaozhen
    Liu, Baoxu
    Xu, Rongsheng
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 356 - 360
  • [35] Applying Fuzzy AHP to Study the KSFs of Information Security Management
    Wang, Jen-Sheng
    Liu, Che-Hung
    Shyu, Joseph Z.
    Huang, Hsiao-Wen
    IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ 2011), 2011, : 2026 - 2032
  • [36] Study on Security of Network Management Information System in Electronic Commerce
    Geng Di
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 716 - 720
  • [37] Study on the general defects in the information security management system (ISMS)
    Kwon, Sungho
    Jang, Sangsoo
    Lee, Jaeill
    INFORMATION PROCESSING IN THE SERVICE OF MANKIND AND HEALTH, 2006, : 463 - +
  • [38] Information Security Management: A Case Study in a Portuguese Military Organization
    Martins, Jose
    dos Santos, Henrique
    Rosinha, Antonio
    Valente, Agostinho
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 32 - 48
  • [39] The Challenges of Implementing Standards Based Information Security within Family Influenced Firms: A Proposed Research Agenda
    Smith, James N.
    AMCIS 2014 PROCEEDINGS, 2014,
  • [40] A study of the security of Internet banking and financial private information in South Korea
    Lee, Jung Hyun
    Lim, Won Gue
    Lim, Jong In
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 117 - 131