Edward Freeman - Academia.edu (original) (raw)
Papers by Edward Freeman
Information Systems Security, 2007
Information Systems Security, 2007
Humanistic Management Journal, 2018
The purpose of this essay is to suggest that one of the dominant modes of thought in our society ... more The purpose of this essay is to suggest that one of the dominant modes of thought in our society is a profound mistrust and misunderstanding of the role of business. A dominant myth in society is that business occupies the moral low ground, separate from ethics or a moral point of view. This position is characterized as the “business sucks” story, and the essay shows how the enactment of this story underlies business thinking among managers and business theorists. The essay concludes with a suggestion to rethink and reinvent this story along more realistic and more empowering lines. Values based capitalism, or stakeholder capitalism, offers a better way to understand the complex role that business does and should play in modern society.
Http Dx Doi Org 10 1201 1086 43325 12 1 20030301 41475 2, Dec 21, 2006
Information Security Management Handbook, Four Volume Set, 2000
Information Security Management Handbook, Four Volume Set, 2000
Publishing Research Quarterly, 2001
Information Systems Management, 1995
The government' s use of the Clipper Chip has managed to offend civil libertarians, law enfor... more The government' s use of the Clipper Chip has managed to offend civil libertarians, law enforcement, politicians, and the computer industry. This new technology raises old questions regarding encryption requirements, standards, and protection. Legal aspects of computing, especially encoded encryption, are examined
Information Systems Security, 2006
Information Systems Security, 2007
Information Systems Security, 2007
It's not true that life is one damn thing after another; it is one damn thing over and over.—... more It's not true that life is one damn thing after another; it is one damn thing over and over.—Edna St. Vincent Millay (1892–1950) Security and privacy experts agree any new technology is always one ...
Information Systems Security, 2007
Abstract" The only truly secure system is one that is powered off, cast in a block of co... more Abstract" The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards-and even then I have my doubts."-Gene Spafford, Professor of Computer Science, Purdue University
Information Systems Security, 2006
Abstract The Internet is firmly established as a primary method of communications. Documents and ... more Abstract The Internet is firmly established as a primary method of communications. Documents and information can be sent online in a matter of seconds, reliably and confidentially. Email addresses have joined telephone numbers and street addresses as acceptable methods of identification and communications. Organizations and individuals throughout the world negotiate contracts, make major purchases and transact business without any exchange of papers.
Information Systems Security, 2005
Information Systems Security, 2005
Abstract In recent years, the press has reported many high-profile corporate frauds, leading in t... more Abstract In recent years, the press has reported many high-profile corporate frauds, leading in turn to major bankruptcies. Congressional committees have investigated widespread financial misstatements in some of America's most trusted organizations. Employees saw their pension funds and life savings evaporate after unscrupulous executives pocketed the last remaining assets. The fall of Arthur Andersen, Enron, Tyco, Healthsouth, Global Crossing, World- Com, and others have cost investors and taxpayers billions.
Information Systems Security, 2005
Abstract A real need exists to use the benefits of modern technology intelligently to reduce the ... more Abstract A real need exists to use the benefits of modern technology intelligently to reduce the court backlogs. Cyber courts are a viable alternative to the endless delays that plague court dockets, but only if they succeed in making courts more efficient.
Information Systems Security, 2000
The Internet allows anyone with a computer and a telephone line to talk to total strangers anywhe... more The Internet allows anyone with a computer and a telephone line to talk to total strangers anywhere in the world. In the pure democracy of the Internet, chat sessions can become virtual masquerade parties, where users can express their own personalities or create new ones, depending on the circumstances and their individual whims. This can all take place based on
Information Systems Security, 2000
Abstract The development of cyberspace and the Internet have changed how we communicate to a larg... more Abstract The development of cyberspace and the Internet have changed how we communicate to a large audience. Television advertising or bulk mailings are extremely expensive, but an individual or organization can send out thousands of e- mails at virtually no cost. Many charitable and business organizations use e-mail to communicate worldwide with their employees, supporters, clients, potential customers, or other interested parties. As the U.S. Supreme Court noted in a recent decision, “any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox.”1
Information Systems Security, 2000
... EDWARD H. FREEMAN, JD, MCT, MCP (edfreeman@hotmail.com) is an educational consultant in West ... more ... EDWARD H. FREEMAN, JD, MCT, MCP (edfreeman@hotmail.com) is an educational consultant in West Hartford, Connecticut. ... FAILURE TO USE TECHNOLOGY — THE TJ HOOPER Clearly, directors have the responsibility of due care to ensure that all reasonable steps are ...
Information Systems Security, 2007
Information Systems Security, 2007
Humanistic Management Journal, 2018
The purpose of this essay is to suggest that one of the dominant modes of thought in our society ... more The purpose of this essay is to suggest that one of the dominant modes of thought in our society is a profound mistrust and misunderstanding of the role of business. A dominant myth in society is that business occupies the moral low ground, separate from ethics or a moral point of view. This position is characterized as the “business sucks” story, and the essay shows how the enactment of this story underlies business thinking among managers and business theorists. The essay concludes with a suggestion to rethink and reinvent this story along more realistic and more empowering lines. Values based capitalism, or stakeholder capitalism, offers a better way to understand the complex role that business does and should play in modern society.
Http Dx Doi Org 10 1201 1086 43325 12 1 20030301 41475 2, Dec 21, 2006
Information Security Management Handbook, Four Volume Set, 2000
Information Security Management Handbook, Four Volume Set, 2000
Publishing Research Quarterly, 2001
Information Systems Management, 1995
The government' s use of the Clipper Chip has managed to offend civil libertarians, law enfor... more The government' s use of the Clipper Chip has managed to offend civil libertarians, law enforcement, politicians, and the computer industry. This new technology raises old questions regarding encryption requirements, standards, and protection. Legal aspects of computing, especially encoded encryption, are examined
Information Systems Security, 2006
Information Systems Security, 2007
Information Systems Security, 2007
It's not true that life is one damn thing after another; it is one damn thing over and over.—... more It's not true that life is one damn thing after another; it is one damn thing over and over.—Edna St. Vincent Millay (1892–1950) Security and privacy experts agree any new technology is always one ...
Information Systems Security, 2007
Abstract" The only truly secure system is one that is powered off, cast in a block of co... more Abstract" The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards-and even then I have my doubts."-Gene Spafford, Professor of Computer Science, Purdue University
Information Systems Security, 2006
Abstract The Internet is firmly established as a primary method of communications. Documents and ... more Abstract The Internet is firmly established as a primary method of communications. Documents and information can be sent online in a matter of seconds, reliably and confidentially. Email addresses have joined telephone numbers and street addresses as acceptable methods of identification and communications. Organizations and individuals throughout the world negotiate contracts, make major purchases and transact business without any exchange of papers.
Information Systems Security, 2005
Information Systems Security, 2005
Abstract In recent years, the press has reported many high-profile corporate frauds, leading in t... more Abstract In recent years, the press has reported many high-profile corporate frauds, leading in turn to major bankruptcies. Congressional committees have investigated widespread financial misstatements in some of America's most trusted organizations. Employees saw their pension funds and life savings evaporate after unscrupulous executives pocketed the last remaining assets. The fall of Arthur Andersen, Enron, Tyco, Healthsouth, Global Crossing, World- Com, and others have cost investors and taxpayers billions.
Information Systems Security, 2005
Abstract A real need exists to use the benefits of modern technology intelligently to reduce the ... more Abstract A real need exists to use the benefits of modern technology intelligently to reduce the court backlogs. Cyber courts are a viable alternative to the endless delays that plague court dockets, but only if they succeed in making courts more efficient.
Information Systems Security, 2000
The Internet allows anyone with a computer and a telephone line to talk to total strangers anywhe... more The Internet allows anyone with a computer and a telephone line to talk to total strangers anywhere in the world. In the pure democracy of the Internet, chat sessions can become virtual masquerade parties, where users can express their own personalities or create new ones, depending on the circumstances and their individual whims. This can all take place based on
Information Systems Security, 2000
Abstract The development of cyberspace and the Internet have changed how we communicate to a larg... more Abstract The development of cyberspace and the Internet have changed how we communicate to a large audience. Television advertising or bulk mailings are extremely expensive, but an individual or organization can send out thousands of e- mails at virtually no cost. Many charitable and business organizations use e-mail to communicate worldwide with their employees, supporters, clients, potential customers, or other interested parties. As the U.S. Supreme Court noted in a recent decision, “any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox.”1
Information Systems Security, 2000
... EDWARD H. FREEMAN, JD, MCT, MCP (edfreeman@hotmail.com) is an educational consultant in West ... more ... EDWARD H. FREEMAN, JD, MCT, MCP (edfreeman@hotmail.com) is an educational consultant in West Hartford, Connecticut. ... FAILURE TO USE TECHNOLOGY — THE TJ HOOPER Clearly, directors have the responsibility of due care to ensure that all reasonable steps are ...