Lech Janczewski

Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP’s Technical Committee on Security and Protection in Information Processing Systems (TC-11).

Publications

International Journal of E-Planning Research (IJEPR)
Carlos Nunes Silva. Est. 2012.
The International Journal of E-Planning Research (IJEPR) publishes original theoretical and innovative empirical research on the many aspects of the emerging interdisciplinary...
Foreword
Lech Janczewski. © 2011. 3 pages.
This Foreword is included in the book Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management.
Road Map to Information Security Management
Lech Janczewski. © 2009. 8 pages.
Developments in multimedia technology and in networking offer to organizations new and more effective ways of conducting their businesses. That includes both internal as well as...
Managing Security Clearances within Government Institutions
Lech Janczewski, Victor Portougal. © 2008. 10 pages.
An Internet search (Google) on government + security clearances + policy indicates that at present, establishment of individual security clearances within the government...
Cyber Warfare and Cyber Terrorism
Lech Janczewski, Andrew Colarik. © 2007. 564 pages.
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems...
Managing Security Clearances within Government Institutions
L. Janczewski. © 2007. 7 pages.
An Internet search (Google) on government + security clearances + policy indicates that at present, establishment of individual security clearances within the government...
Managerial Guide for Handling Cyber-Terrorism and Information Warfare
Lech Janczewski, Andrew Colarik. © 2005. 245 pages.
Managerial Guide for Handling Cyber-Terrorism and Information Warfare presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems...
International Journal of Electronic Government Research (IJEGR)
Nripendra P. Rana. Est. 2005.
The International Journal of Electronic Government Research (IJEGR) is a peer-reviewed, multi-disciplinary, international journal that publishes high-quality, original research...
Road Map to Information Security Management
Lech J. Janczewski, Victor Portougal. © 2005. 8 pages.
Developments in multimedia technology and networking offer organizations new and more effective ways of conducting their businesses. That includes intensification of external...
Information and Computer Security
Lech J. Janczewski, Andrew M. Colarik. © 2005. 23 pages.
The current state of the information security domain in the United States and much of the rest of the industrialized world can best be characterized as overly optimistic. The...
The Nature of Terrorism
Lech J. Janczewski, Andrew M. Colarik. © 2005. 16 pages.
The events surrounding the attacks against the World Trade Center (February 26, 1993 and September 11, 2001) and the Pentagon (September 11, 2001) generated enormous interest in...
Cyber-Terrorism
Lech J. Janczewski, Andrew M. Colarik. © 2005. 21 pages.
In this time of increased threats of terrorist attacks, are IT professionals really facing a new type of danger resulting from these activities? In our opinion, the answer is...
Physical Security
Lech J. Janczewski, Andrew M. Colarik. © 2005. 24 pages.
The final stage in the execution of the majority of the current waves of terrorist attacks is in the form of an intruder positioning a bomb in the proximity of the target. While...
Denial of Service Threat
Lech J. Janczewski, Andrew M. Colarik. © 2005. 12 pages.
n the early 1960s, programmers used to play memory games on a computer. The objective of the game was to disable as much of the operating system memory as possible in order to...
Web Defacements and Semantic Attacks
Lech J. Janczewski, Andrew M. Colarik. © 2005. 9 pages.
The mass use of the Internet as a trade and distribution tool has become the source of a new type of attack—the defacement of Web page content. Due to the nature of this...
DNS Attacks
Lech J. Janczewski, Andrew M. Colarik. © 2005. 4 pages.
The Domain Name Service (DNS) is a mechanism for recognizing and translating domain name addresses. These operations are carried out by devices called Domain Name Servers. Thus...
Routing Vulnerabilities
Lech J. Janczewski, Andrew M. Colarik. © 2005. 9 pages.
The graphic visualization of the Internet is usually presented as a mesh of connections among millions of nodes engaged in the transmission of billions of messages. These...
Identity Stealing Attacks
Lech J. Janczewski, Andrew M. Colarik. © 2005. 10 pages.
In recent years, several feature films have been produced based on the concept of stealing an identity. As a result of deliberate or accidental changes to personal records, a...
Identification, Authentication, and Access Control
Lech J. Janczewski, Andrew M. Colarik. © 2005. 34 pages.
It is a known fact that terrorists are developing a keen set of technology skills to further their agendas. As previously stated, they use IT for their operational purposes as...
Personnel Security
Lech J. Janczewski, Andrew M. Colarik. © 2005. 12 pages.
The importance of security issues relating to personnel policies has and continues to be a factor in the overall protection of organizational systems. Apart from the general...
Operations Management
Lech J. Janczewski, Andrew M. Colarik. © 2005. 24 pages.
A major focus of this book is guiding IT managers on how to secure the operations of their facilities due to increased threats from terrorist oriented attacks. As it was...
Information Security Policy
Lech J. Janczewski, Andrew M. Colarik. © 2005. 14 pages.
In Chapter 12, we discussed most of the information security issues that are important to IT managers, especially in the current situation of increased attacks. Perhaps the most...
Business Continuity Management
Lech J. Janczewski, Andrew M. Colarik. © 2005. 9 pages.
Business continuity management is a process aimed at reducing disruptions caused by disasters and security failures that could be the results of natural phenomena, accidents...
New Challenges in Privacy Protection
Lech J. Janczewski. © 2003. 16 pages.
The protection of privacy is a function of many variables: culture, politics, and point of view. Practically all countries have introduced laws regulating these problems....
Internet and Intranet Security Management: Risks and Solutions
Lech Janczewski. © 2000. 302 pages.
In the last 12 years we have observed amazing growth of electronic communication. From typical local networks through countrywide systems and business-based distributed...
Information Security Framework for Health Information Systems
Lech J. Janczewski. © 2000. 30 pages.
This chapter outlines the major issues related to the security of medical information systems. Medical information systems are unique in this sense that integrity of the records...
Managing Security Functions Using Security Standards
Lech Janczewski. © 2000. 25 pages.
In this chapter we will discuss the issue of managing security processing in business organization with special emphasis on computer systems. Our intention is not to prove that...
Toward A Global Telematics Policy
Lech Janczewski, Andrew Targowski. © 1994. 12 pages.
Developments in computers and in telecommunications lead to the conclusion that these two field will eventually merge. The term “Telematics” is the name of the product of that...
Journal of Global Information Management (JGIM)
Zuopeng (Justin) Zhang. Est. 1993.
The Journal of Global Information Management (JGIM) provides a forum for researchers and practitioners to share leading-edge knowledge in the global information resource...