Treasury management systems—Key concepts
✍ Scribed by Krish Bhaskar; David Stamper
- Publisher
- Elsevier Science
- Year
- 1991
- Weight
- 913 KB
- Volume
- 1991
- Category
- Article
- ISSN
- 0960-2593
No coin nor oath required. For personal study only.
✦ Synopsis
Personal computing has long lagged behind its larger counterparts when it comes to security. We do not apply the same system development standards to systems created by users for themselves on their own PCs, as we do to systems being developed on mainframe or midrange computers by the management services department. We usually do not have any form of logical access security on PCs, although this security is more likely when they are linked into networks. We often leave them unattended when we take a natural break or go to lunch. We also tend not to take back-up copies of our data files, and, where we do, it is all too often at a frequency that is totally inadequate to provide us with the ability to recreate lost or corrupted data. Unless we start to take steps to provide adequate computer security over PCs as well as our mainline computing, many more of us could face similar embarrassments to the Wing Commander, who is now contemplating the role of the individual in computer security from the 'other duties' position to which he has been transferred.
📜 SIMILAR VOLUMES
## MIS departments. Better understanding of treasury managers' work and preferences therefore is a prerequisite for successful tWiSUq MIS.
Cooperation among various types of management functions is necessary to allow management functions to interwork in providing and using information and services for systems management. To understand these tasks from the point of view of cooperative working, this article discusses the requirements and