Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Information security: reality and fiction
Polis R. Computers and Security3 (3):225-228,1984.Type:Article
Date Reviewed: Jul 1 1985

This all-too-brief paper is divided into four parts: (1) Introduction, (2) Evolving Awareness of Need, (3) Reactions of Organizations, and (4) Best Practice. As the author states, “The purpose of this paper is to convey the observations and impresssions gathered by Geneva Management Group." Polis is cofounder and general manager of Geneva Management--a Swiss consulting firm specializing in the area of information security. Such a broad purpose, even with creditable expertise, is doomed to vagaries and generalities in a paper that is only four pages long.

Part 2 contains vague references (without citation) to well-publicized security breaches. Generalities, of no serious insight, and non sequiturs abound in the third part. Actually, the last section is where substantial discussion begins and meaningful insights are given. But, alas, the level of competence of the author does not seem to be reflected in the depth of his paper. Shallow methodology and unexplained terminology are barriers to even the most dedicated of readers. The paper is not recommended reading; but keep Polis on your list of promising experts and writers in the area of computer security.

Reviewer:  W. Frederick Review #: CR123221
Bookmark and Share
 
Abuse And Crime Involving Computers (K.4.2 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The human factor in computer crime
Van Duyn J., Petrocelli Books, Inc., Princeton, NJ, 1985. Type: Book (9789780894332562)
May 1 1987
Crime and the computer
Wasik M., Oxford University Press, Inc., New York, NY, 1991. Type: Book (9780198256212)
Jun 1 1992
Combating computer crime
Buckland J. (ed), McGraw-Hill, Inc., New York, NY, 1992. Type: Book (9780830676644)
Mar 1 1993
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy