Loading...
Please wait, while we are loading the content...
Similar Documents
End-User Computing Control Guidelines
| Content Provider | Scilit |
|---|---|
| Author | Hale, Ron |
| Copyright Year | 2020 |
| Description | This chapter examines end-user computing control within the context of an architecture based on quality. As end-user computing systems have advanced, many of the security and management issues have been addressed. A central administration capability and an effective level of access authorization and authentication generally exist for current systems that are connected to networks. In prior architectures, the network was only a transport mechanism. In many of the systems that are being designed and implemented today, however, the network is the system and provides many of the controls that had been available on the mainframe. For example, many workstations now provide power-on passwords; storage capacity has expanded sufficiently so that workers are not required to maintain diskette files; and control over access to system functions and to data is protected not only through physical means but also through logical security, encryption, and other techniques. Book Name: Enterprise Operations Management |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2006-0-18257-1&isbn=9781003069386&doi=10.1201/9781003069386-50&format=pdf |
| Ending Page | 447 |
| Page Count | 11 |
| Starting Page | 437 |
| DOI | 10.1201/9781003069386-50 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2020-10-09 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Enterprise Operations Management Computation Theory and Mathematics Functions Systems End User Architectures User Computing Control |
| Content Type | Text |
| Resource Type | Chapter |