Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Karen A. Forcht is active.

Publication


Featured researches published by Karen A. Forcht.


Internet Research | 1997

Get linked or get lost: marketing strategy for the Internet

Alicia Aldridge; Karen A. Forcht; Joan K. Pierson

Develops detailed marketing strategy recommendations for online commerce based on the general popularity of the Internet, the unique nature of doing business there, and how its attributes may be utilized for a successful marketing presence.


Internet Research | 1997

Security considerations of doing business via the Internet: cautions to be considered

Alicia Aldridge; Michele White; Karen A. Forcht

Looks at the growth and potential of the Internet in relation to security issues. Presently, lack of security is perceived as a major roadblock to doing business on‐line. Risks of system corruption, fraud, theft and viruses point companies to the need for enhanced security. Investigates the importance of securing a company’s systems, its individual users, and its commercial transactions, and provides a checklist along with a brief discussion of available protection measures for these three primary security concerns.


Information Management & Computer Security | 1996

Doing business on the Internet: marketing and security aspects

Karen A. Forcht

Acknowledges that many prospective business users are wary of the Internet because of existing and potential security loopholes. Gives an overview of the security problems and solutions and concludes that doing business online involves some risks, like any other business transaction, but, if attention is devoted to installing secure procedures, it is no riskier than other business practices.


Information Management & Computer Security | 2002

Protecting personal privacy on the Internet

S. E. Kruck; Danny Gottovi; Farideh Moghadami; Ralph Broom; Karen A. Forcht

The rapid advance of technology has permitted the creation of vast amounts of information, both on and off the Internet. The public is only just beginning to realize how this information, especially personal information, may be used in ways that may not be acceptable. Laws across different countries are often conflicting, making it difficult to control how personal information is being used and how individual privacy is being violated. The solution to this problem lies somewhere between government, industry, and the individual. This paper discusses the current state of personal privacy in each of these three areas.


Journal of Business Ethics | 1998

Human resource information systems: An overview of current ethical and legal issues

Joan C. Hubbard; Karen A. Forcht; Daphyne Saunders Thomas

Human resource managers must manage a plethora of personnel activities associated with company employees: recruiting, training, pro moting, demoting, and recordkeeping. Technol ogy has made it easier and cheaper HR managers to gather and maintain an infinite amount of data about present and prospective employees. Dawes (1994) reports that todays information systems demand a level of technical sophistication and managerial skill far beyond what was required by the simple recording of standardized transac tions in stand-alone files. An essential component in the success of managing this data is the Human Resource Information System (HRIS), a database of personal information about each employee. Because of the power to access and use HRIS data, HR managers must be aware of the ethical and legal issues associated with both the creation and use of those data in the HRIS.


Information Management & Computer Security | 1996

Information security in business environments

Ethan Sanderson; Karen A. Forcht

Presents a young person’s view of the threats and security measures to deal with sensitive information in today’s constantly changing technological environment. Promotes the implementation of proactive security and warns of the problems caused by converging business markets and technologies. Discusses security policy, privacy, security logs, encryption, virus attacks, Internet concerns, firewalls and auditing. Outlines the work of the Computer Emergency Response Team and the Computer Incident Advisory Capability in the USA.


Industrial Management and Data Systems | 1999

Using data mining and datawarehousing techniques

Karen A. Forcht; Kevin Cochran

Discusses some of the techniques of database marketing, its effectiveness, and the business and social environment regarding direct database marketing. Notes that the process of gathering and using the right data effectively is of primary importance if the marketer is to succeed.


Internet Research | 1995

Security issues and concerns with the Internet

Karen A. Forcht; Richard E. Fore

Draws its topicality and relevance from the fact that not only is the Internet widely publicized in all the media but also there are many stories regarding problems with its security. Provides a primer on the history, terminology, tools and common uses of the Internet. Identifies the most prevalent threats to security posed by using the Internet and discusses some of the traditional and emerging approaches to ensuring the security and integrity of data on the Internet.


Internet Research | 1998

Legal considerations of Internet use ‐ issues to be addressed

Daphyne Saunders Thomas; Karen A. Forcht; Peter Counts

With an estimated over 40 million Internet users all over the world, things that once happened only in “real life” are starting to occur in this virtual world. This Internet, just like the physical world, cannot rely on laws alone to keep order. The rules that regulate behavior, the policies for what is acceptable and the laws that pertain to activities have developed and will continue to emerge over time. However, conflicts of interest are inevitable and wherever conflict occurs, the government will regulate on matters including e‐mail, data theft, piracy, search and seizure, electronic banking, offensive behavior, and other legal liability issues.


Proceedings of the ACM SIGCPR conference on Management of information systems personnel | 1988

Developing awareness of computer ethics

Karen A. Forcht; Joan K. Pierson; Ben M. Bauman

The most important factor in effective computer security is people—their attitudes, their actions, and their sense of right and wrong. This workshop will explore the ethical problems and issues raised in the computing environment. Topics to be discussed include misuse of computers, concepts of privacy, codes of conduct for computer professionals, disputed rights to products, defining ethical, moral, and legal parameters, and what security practitioners should do about ethics. Audience opinions will be welcome as they will aid in developing ethical standards for the information systems profession.

Collaboration


Dive into the Karen A. Forcht's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ben M. Bauman

James Madison University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alicia Aldridge

Appalachian State University

View shared research outputs
Top Co-Authors

Avatar

Joan C. Hubbard

University of West Georgia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Faye P. Teer

James Madison University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge