Main topic: Clever Mobile Devices, Biometric Signatures
PUBLISHED: 18.06.2012
These articles were subject to peer-to-peer review
6) Interview with Daniel Rous
The IT Director and ČEZ Group Security Department – Security Director discussed the current issues involved with his work with the Editor-in-Chief of DSM, Jaroslav Dočkal.
10) Clever Mobile Devices – Survey Results and What are the Implications
Vladimír Jech
The use of smart phones and tablets in the corporate and business setting brings many challenges for their security as well as their administration. This article summarizes the results of research on the use of smart mobile devices in the Czech environment and offers a review of the approaches currently available for their administration, especially with respect to security.
16) Consumerization – A New Factor in ICT Management
Jaroslav Dočkal
This article is devoted to the security and technical aspects of consumerization. It also discusses the influences on the understanding of business intelligence and the ICT department.
20) Dynamic Biometric Signatures – Myths and Facts
Vladimír Smejkal, Jindřich Kodl
This article deals with the myths and inaccuracies that have been published on dynamic biometric signatures. The authors describe how they can be incorporated into the context of the Electronic Signatures Act and what conditions must be met during implementation.
24) Biometric Signature in PDF
Libor Dostálek, Kateřina Štíchová
This paper describes the use of biometric dynamic signatures in the PDF format and their location in a PDF document. It also summarizes the encryption of PDF documents and various types of electronic signatures in PDF format.
28) COBIT 5 – New Methodological Thinking
Luděk Novák
This article describes a new version of the COBIT 5 methodology, which was released in April this year. The five key principles, which use the new version, are gradually introduced and explained. During its fifteen-year history, the principles in the new COBIT are the biggest change that brings great challenges associated with IT governance.
32) Obstacles to Forensic Detection Systems in the Banking Sector
Igor Šandrej
Banks are threatened by clients who provide true information about themselves, which, however, is only fictional. How can fraud be detected if all of the information is true? A solution is the use of forensic MIS that extend the standard detection criteria.
36) ITIL V3, 2011 Edition – Part I
Vladimír Kufner
This article introduces small changes in the conceptual ITIL V3 lifecycle model and describes the 2011 edition in more detail, focusing on the changes from the 2007 edition. The author provides his personal view on particular core publications, describing what (in the eyes of the author) has been improved and has provided benefits and what still needs to be improved. For the more important changes, this article focuses on individual processes, which might help companies applying ITIL V3 to the older 2007 edition.
The articles on pp. 10–34 and 36–42 were subject to a review by the Editorial Board of DSM.