As managements grapple with the ever-rising tide of changes brought about by new opportunities in IT, there is a feeling that traditional approaches to security need to be reviewed. A background of increased opportunities for fraudsters and criminals of various kinds is pressing managers to find quickly a way of understanding and coming to terms with the new order (disorder) of things. This book aims to present the problems of managing information securely in a modern organization which is making extensive use of information technology. The emphasis is on demonstrating that solutions to security are to be found in adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions.
As managements grapple with the ever-rising tide of changes brought about by new opportunities in IT, there is a feeling that traditional approaches to security need to be reviewed. A background of increased opportunities for fraudsters and criminals of various kinds is pressing managers to find quickly a way of understanding and coming to terms with the new order (disorder) of things. This book aims to present the problems of managing information securely in a modern organization which is making extensive use of information technology. The emphasis is on demonstrating that solutions to security are to be found in adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions.
Sprache
Verlagsort
Zielgruppe
ISBN-13
978-1-86152-040-1 (9781861520401)
Copyright in bibliographic data is held by Nielsen Book Services Limited or its licensors: all rights reserved.
Schweitzer Klassifikation
Autor*in
London School of Economics
Part 1 Information security: a problem. Part 2 Strategic issues: managing the information assets - issues and concerns; developing secure environments; management of information systems security; secure communication. Part 3 Risk Management: nature and scope of risk management; secure systems development; business continuity planning; evaluating information systems security. Part 4 Legal issues: information society and emergent concerns; investigating information security; computer forensics. Part 5 Emergent concerns: problems of security and control in database marketing systems; the emergence of a networked society and concerns for whiter collar crime.