... privacy, allocating new passwords, checking logs for unauthorised access ... valuable assets to the owner: unauthorised access, loss or corruption may cause ...
... range of information systems to serve the varied needs of users: ... uses at present are games, infotainment, education, advertising, corporate ... Chapters 2, 4 ...
Title: Process Modelling Author: Barry Atkinson & Andrew Barnden Last modified by: barry Created Date: 4/11/1999 1:22:46 AM Document presentation format