Control and security of computer information systems
Control and security of computer information systems
Systems engineering
Risk Management for Security Professionals
Risk Management for Security Professionals
Journal of Systems and Software
General drawing of the integrated framework for security governance
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Assessment methodology on maturity level of ISMS
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Hi-index | 0.00 |
Instant messenger (IM) has grown rapidly to involve billions of users. It can eliminate long trails of voice mails and e-mails, and it is especially valuable to link remote individuals. The previous researches of the bad influences of IM are focused on interruption of desktop computing tasks. We take the security problems of IM into consideration because IM has many security risks that may have severed impacts. In this paper, we provide the requirements analysis of security systems to control IM's risks and our development efforts to implement these security systems in technical aspects.