1987
DOI: 10.1016/0167-4048(87)90083-6
|View full text |Cite
|
Sign up to set email alerts
|

How security fits in — a management view

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The articles also propose strategies for requesting funding for security projects. See for example: "Data security is a management responsibility" [22], "How security fits ina management view" [23], "Discussing security with top management" [24], "Security systems: getting management to shell out" [25], and "Getting management buy-in to IT Security" [26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The articles also propose strategies for requesting funding for security projects. See for example: "Data security is a management responsibility" [22], "How security fits ina management view" [23], "Discussing security with top management" [24], "Security systems: getting management to shell out" [25], and "Getting management buy-in to IT Security" [26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The three key pillars of information security demand that the "confidentiality, integrity and availability" of information must at all times be protected (Whitman & Mattord, 2005). The importance of security as a key measure of the quality of data is evidenced by the fact that businesses require information that is "reliable, of high integrity and that guards privacy" (Schweitzer, 1987). Security in the data breach area would thus measure the extent to which data on public websites is protected from hacking and from modification or deletion by non-authorized personnel.…”
Section: Determining What the Stakeholders Would Need From Data Breac...mentioning
confidence: 99%