1992
DOI: 10.1016/0268-4012(92)90017-k
|View full text |Cite
|
Sign up to set email alerts
|

Information systems security: A managerial perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
3

Year Published

1996
1996
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 18 publications
0
3
0
3
Order By: Relevance
“…''If you ask a computer security professional what the single most important thing you can do to protect your network is, they will unhesitatingly say that it is to write a good security policy'' (Wadlow, 2000). This policy is then translated into action through an effective security plan focusing on the prevention, detection, and correction of threats (Wilson, Turban, & Zviran, 1992). According to the Cutter Consortium (Cutter Consortium, 1999), in 1999 over 20% of responding businesses had no security policy, and almost 14% had no plans to develop one in the near future.…”
Section: The Need For Policymentioning
confidence: 99%
“…''If you ask a computer security professional what the single most important thing you can do to protect your network is, they will unhesitatingly say that it is to write a good security policy'' (Wadlow, 2000). This policy is then translated into action through an effective security plan focusing on the prevention, detection, and correction of threats (Wilson, Turban, & Zviran, 1992). According to the Cutter Consortium (Cutter Consortium, 1999), in 1999 over 20% of responding businesses had no security policy, and almost 14% had no plans to develop one in the near future.…”
Section: The Need For Policymentioning
confidence: 99%
“…A diversidade de alvos que podem ser atacados contribui para a importância de práticas e procedimentos de segurança cibernética [Wilson et al 1992].…”
Section: Segurança Cibernéticaunclassified
“…Insiders, by definition, attack their employing organization, and are, therefore, engaging in targeted attacks, although the timing may be opportunistic. Frequently, insiders are disgruntled employees, motivated by specific employmentrelated grievances [Wilson et al, 1992;Dhillon and Moores, 2001;Rogers, 2006]. Such grievances tend to rationalize, or justify computer crimes in the mind of the insider.…”
Section: Offender-victim Relationshipmentioning
confidence: 99%