首页 > 最新文献

Journal of Information Systems Security最新文献

英文 中文
Vulnerability Disclosure: The Strange Case of Bret McDanel 漏洞披露:Bret McDanel的奇怪案例
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980601144915
Edward H. Freeman
Responsible developers work hard to produce secure, reliable, and efficient software packages. No company wants its integrity compromised by hackers, employees, or legitimate users. Negative publicity damages a firm’s reputation. Legal proceedings can cost an organization millions and destroy any chance of long-term success. Realistically, few products are released without security flaws. Programmers and system designers strive to find security bugs during the development cycle or at worse during beta testing, when bugs can be fixed easily. Careful testing will allow internal programmers to debug the software without publicity or industry notice. The outcome may differ if outsiders discover a security breach. Malicious hackers may exploit the breach to obtain classified information, to destroy the integrity of the information, or simply for the challenge. Even self-described “ethical hackers” may share this information with no discretion. Given the speed of the Internet, security breaches can be transmitted worldwide in hours. This article deals with vulnerability disclosure, where the details of a security breach are freely available. It also deals with the bizarre case of Bret McDanel, a young computer expert who spent 16 months in federal prison after he exposed a security breach in his former employer’s software package.
负责任的开发人员努力生产安全、可靠和高效的软件包。没有一家公司希望自己的诚信受到黑客、员工或合法用户的损害。负面宣传会损害公司的声誉。法律诉讼可能使一个组织损失数百万美元,并摧毁任何长期成功的机会。实际上,很少有产品是没有安全缺陷的。程序员和系统设计人员努力在开发周期中找到安全漏洞,或者更糟糕的是在beta测试期间,因为bug可以很容易地修复。仔细的测试将允许内部程序员在没有公开或行业通知的情况下调试软件。如果外部人员发现安全漏洞,结果可能会有所不同。恶意的黑客可能会利用这个漏洞来获取机密信息,破坏信息的完整性,或者仅仅是为了挑战。甚至自称为“道德黑客”的人也可能毫无顾忌地分享这些信息。鉴于互联网的速度,安全漏洞可以在数小时内传播到世界各地。本文讨论漏洞披露,其中安全漏洞的详细信息是免费提供的。它还涉及Bret McDanel的离奇案件,这位年轻的计算机专家在揭露前雇主软件包中的安全漏洞后,在联邦监狱服刑16个月。
{"title":"Vulnerability Disclosure: The Strange Case of Bret McDanel","authors":"Edward H. Freeman","doi":"10.1080/10658980601144915","DOIUrl":"https://doi.org/10.1080/10658980601144915","url":null,"abstract":"Responsible developers work hard to produce secure, reliable, and efficient software packages. No company wants its integrity compromised by hackers, employees, or legitimate users. Negative publicity damages a firm’s reputation. Legal proceedings can cost an organization millions and destroy any chance of long-term success. Realistically, few products are released without security flaws. Programmers and system designers strive to find security bugs during the development cycle or at worse during beta testing, when bugs can be fixed easily. Careful testing will allow internal programmers to debug the software without publicity or industry notice. The outcome may differ if outsiders discover a security breach. Malicious hackers may exploit the breach to obtain classified information, to destroy the integrity of the information, or simply for the challenge. Even self-described “ethical hackers” may share this information with no discretion. Given the speed of the Internet, security breaches can be transmitted worldwide in hours. This article deals with vulnerability disclosure, where the details of a security breach are freely available. It also deals with the bizarre case of Bret McDanel, a young computer expert who spent 16 months in federal prison after he exposed a security breach in his former employer’s software package.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75233202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implicit Trust Can Lead to Data Loss 隐式信任可能导致数据丢失
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980701260520
S. Fleming
{"title":"Implicit Trust Can Lead to Data Loss","authors":"S. Fleming","doi":"10.1080/10658980701260520","DOIUrl":"https://doi.org/10.1080/10658980701260520","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82224041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Effective Change Management: Ensuring Alignment of IT and Business Functions 有效的变更管理:确保IT和业务功能的一致性
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980601144899
W. Yarberry
This article originally published as “Change Management” in EDPACS, 2005, 33(4):12–24.
本文原题为“变革管理”,载于《教育管理与管理》,2005,33(4):12-24。
{"title":"Effective Change Management: Ensuring Alignment of IT and Business Functions","authors":"W. Yarberry","doi":"10.1080/10658980601144899","DOIUrl":"https://doi.org/10.1080/10658980601144899","url":null,"abstract":"This article originally published as “Change Management” in EDPACS, 2005, 33(4):12–24.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80361479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Do Information Security Professionals and Business Managers View Information Security Issues Differently? 信息安全专业人员和业务经理对信息安全问题的看法不同吗?
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980701260579
R. Rainer, T. Marshall, Kenneth J. Knapp, Gina H. Montgomery
Organizations today know that information technology is essential not only for daily operations but also for gaining strategic advantage in the marketplace. The importance of information technology means that information security has also become important. Breaches in information security can result in litigation, financial losses, damage to brands, loss of customer confidence, loss of business partner confidence, and can even cause the organization to go out of business. A recent study (Knapp, Marshall, Rainer, & Morrow 2006) surveyed 874 certified information system security professionals (CISSPs) to determine and rank the top 25 information security issues. Of the 18 highest-ranked issues, 10 were more managerial in nature rather than technical. Table 1 shows these ten issues with their ranks in parentheses. As we consider these ten issues as a whole, we see how critically important it is for information security professionals to have strong business, management, and organizational skills. As we look at each issue individually, we see a list of specific areas where information security professionals should have competence in order to effectively operate in an organizational context. The list of issues in Table 1 represents the issues with which information security professionals often have the most difficulty addressing. For example, three of these issues emphasize the need for excellent communication between information security professionals and business managers. The issues of “top management support,” “low funding and inadequate budgets,” and “justifying security expenditures” are closely related. The support of organizational executives is clearly needed to obtain the necessary funding for the information security function. To obtain this funding, information security professionals must present a coherent business case for information security needs. Information security professionals must also communicate with the entire user community to raise their awareness of information security issues through training and education, thereby promoting an organizational culture attuned to information security. Information security professionals must also work with business managers and the user community during the risk Address correspondence to R. Kelly Rainer, Jr., Ph.D., George Phillips Privett Professor of Management Information Systems at Auburn University, Auburn, Alabama. E-mail: rainerk@auburn.edu Do Information Security Professionals and Business Managers View Information Security Issues Differently?
今天的组织都知道,信息技术不仅对日常运作至关重要,而且对在市场上获得战略优势也至关重要。信息技术的重要性意味着信息安全也变得重要起来。违反信息安全可能导致诉讼、财务损失、品牌损害、客户信心丧失、业务合作伙伴信心丧失,甚至可能导致组织倒闭。最近的一项研究(Knapp, Marshall, Rainer, & Morrow 2006)调查了874名经过认证的信息系统安全专业人员(cissp),以确定前25个信息安全问题并对其进行排名。在排名最高的18个问题中,有10个问题在本质上更像是管理问题,而非技术性问题。表1在括号中显示了这十个问题的排名。当我们将这十个问题作为一个整体来考虑时,我们会看到对于信息安全专业人员来说,拥有强大的业务、管理和组织技能是多么的重要。当我们单独查看每个问题时,我们会看到信息安全专业人员应该具备的特定领域的列表,以便在组织上下文中有效地操作。表1中的问题列表代表了信息安全专业人员通常最难以解决的问题。例如,其中三个问题强调了信息安全专业人员和业务经理之间良好沟通的必要性。“高层管理支持”、“资金不足和预算不足”以及“证明安全支出的合理性”等问题是密切相关的。为了获得信息安全功能所需的资金,显然需要组织高管的支持。为了获得这笔资金,信息安全专业人员必须为信息安全需求提供连贯的业务案例。信息安全专业人员还必须与整个用户社区进行沟通,通过培训和教育提高他们对信息安全问题的认识,从而促进与信息安全相适应的组织文化。在与阿拉巴马州奥本大学管理信息系统George Phillips Privett教授R. Kelly Rainer, Jr.进行风险地址通信期间,信息安全专业人员还必须与业务经理和用户社区合作。电子邮件:rainerk@auburn.edu信息安全专业人员和业务经理对信息安全问题的看法不同吗?
{"title":"Do Information Security Professionals and Business Managers View Information Security Issues Differently?","authors":"R. Rainer, T. Marshall, Kenneth J. Knapp, Gina H. Montgomery","doi":"10.1080/10658980701260579","DOIUrl":"https://doi.org/10.1080/10658980701260579","url":null,"abstract":"Organizations today know that information technology is essential not only for daily operations but also for gaining strategic advantage in the marketplace. The importance of information technology means that information security has also become important. Breaches in information security can result in litigation, financial losses, damage to brands, loss of customer confidence, loss of business partner confidence, and can even cause the organization to go out of business. A recent study (Knapp, Marshall, Rainer, & Morrow 2006) surveyed 874 certified information system security professionals (CISSPs) to determine and rank the top 25 information security issues. Of the 18 highest-ranked issues, 10 were more managerial in nature rather than technical. Table 1 shows these ten issues with their ranks in parentheses. As we consider these ten issues as a whole, we see how critically important it is for information security professionals to have strong business, management, and organizational skills. As we look at each issue individually, we see a list of specific areas where information security professionals should have competence in order to effectively operate in an organizational context. The list of issues in Table 1 represents the issues with which information security professionals often have the most difficulty addressing. For example, three of these issues emphasize the need for excellent communication between information security professionals and business managers. The issues of “top management support,” “low funding and inadequate budgets,” and “justifying security expenditures” are closely related. The support of organizational executives is clearly needed to obtain the necessary funding for the information security function. To obtain this funding, information security professionals must present a coherent business case for information security needs. Information security professionals must also communicate with the entire user community to raise their awareness of information security issues through training and education, thereby promoting an organizational culture attuned to information security. Information security professionals must also work with business managers and the user community during the risk Address correspondence to R. Kelly Rainer, Jr., Ph.D., George Phillips Privett Professor of Management Information Systems at Auburn University, Auburn, Alabama. E-mail: rainerk@auburn.edu Do Information Security Professionals and Business Managers View Information Security Issues Differently?","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78954859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Service of Process by Email 以电子邮件送达程序
Q4 Social Sciences Pub Date : 2006-12-01 DOI: 10.1080/10658980601051979
Edward H. Freeman
Abstract The Internet is firmly established as a primary method of communications. Documents and information can be sent online in a matter of seconds, reliably and confidentially. Email addresses have joined telephone numbers and street addresses as acceptable methods of identification and communications. Organizations and individuals throughout the world negotiate contracts, make major purchases and transact business without any exchange of papers.
互联网已经成为人们交流的主要方式。文件和信息可以在几秒钟内可靠、保密地发送到网上。电子邮件地址已加入电话号码和街道地址的行列,成为可接受的身份识别和通信方式。世界各地的组织和个人在没有任何文件交换的情况下谈判合同,进行重大采购和交易。
{"title":"Service of Process by Email","authors":"Edward H. Freeman","doi":"10.1080/10658980601051979","DOIUrl":"https://doi.org/10.1080/10658980601051979","url":null,"abstract":"Abstract The Internet is firmly established as a primary method of communications. Documents and information can be sent online in a matter of seconds, reliably and confidentially. Email addresses have joined telephone numbers and street addresses as acceptable methods of identification and communications. Organizations and individuals throughout the world negotiate contracts, make major purchases and transact business without any exchange of papers.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79735990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Honeynet Learning: Discovering Information Security 蜜网学习:发现信息安全
Q4 Social Sciences Pub Date : 2006-12-01 DOI: 10.1080/10658980601052019
M. Talabis
Abstract We believe information security learning is an area that would benefit greatly from the integration of the honeynet.
我们认为信息安全学习是一个将从蜜网集成中获益的领域。
{"title":"Honeynet Learning: Discovering Information Security","authors":"M. Talabis","doi":"10.1080/10658980601052019","DOIUrl":"https://doi.org/10.1080/10658980601052019","url":null,"abstract":"Abstract We believe information security learning is an area that would benefit greatly from the integration of the honeynet.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76864667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Year of the Rootkit Rootkit之年
Q4 Social Sciences Pub Date : 2006-12-01 DOI: 10.1080/10658980601051797
Ken Dunham
Abstract In December 2005, I predicted that 2006 would be the “Year of the Rootkit.” Recent statistics and major attacks have proven this to be the case. Rootkits are more prevalent than ever, especially on the Windows platform. This report provides an introduction to Windows rootkits, recent trends, how they function, and how you can detect and remove rootkits.
2005年12月,我预测2006年将是“Rootkit之年”。最近的统计数据和主要攻击已经证明了这一点。rootkit比以往任何时候都更加普遍,尤其是在Windows平台上。本报告介绍了Windows rootkit,最近的趋势,它们是如何工作的,以及如何检测和删除rootkit。
{"title":"Year of the Rootkit","authors":"Ken Dunham","doi":"10.1080/10658980601051797","DOIUrl":"https://doi.org/10.1080/10658980601051797","url":null,"abstract":"Abstract In December 2005, I predicted that 2006 would be the “Year of the Rootkit.” Recent statistics and major attacks have proven this to be the case. Rootkits are more prevalent than ever, especially on the Windows platform. This report provides an introduction to Windows rootkits, recent trends, how they function, and how you can detect and remove rootkits.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91289780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing the Return on Investment on Information Security Programs: Program Governance and Metrics 最大化信息安全项目的投资回报:项目治理和度量
Q4 Social Sciences Pub Date : 2006-12-01 DOI: 10.1080/10658980601051482
Cezar Drugescu, Rafael Etges
Abstract This article provides a discussion of the way organizations currently seek to effectively evaluate their existing information security initiatives and to build realistic business cases to increase executive awareness of risk and regulatory compliance, and, therefore, to secure budgets for new expenditures on internal controls.
本文讨论了组织目前如何有效地评估其现有的信息安全计划,并构建现实的业务案例,以提高高管对风险和法规遵从性的认识,从而确保内部控制新支出的预算。
{"title":"Maximizing the Return on Investment on Information Security Programs: Program Governance and Metrics","authors":"Cezar Drugescu, Rafael Etges","doi":"10.1080/10658980601051482","DOIUrl":"https://doi.org/10.1080/10658980601051482","url":null,"abstract":"Abstract This article provides a discussion of the way organizations currently seek to effectively evaluate their existing information security initiatives and to build realistic business cases to increase executive awareness of risk and regulatory compliance, and, therefore, to secure budgets for new expenditures on internal controls.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83283324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Risk Conductors 风险导体
Q4 Social Sciences Pub Date : 2006-12-01 DOI: 10.1080/10658980601051409
T. Macaulay
Abstract Akin to sound resonating through a piano wire, impacts from both physical (flood, vandalism/sabotage, explosions, pandemics, etc.) and logical (network/software/data) incidents resonate between and through enterprises and business hierarchies via “risk conductors.” There are two orders of risk conductor: Critical Infrastructure (CI) as the industrial risk conductors, and intra-organizational operational risk conductors in the form of Human Factors (HF) and Information and Communication Technology (ICT). Risk conductors, either industrial or operational, are the dispersal agents of geographically centered, physical, or logical impacts. Critical infrastructures may transmit an impact from one enterprise to another throughout an economy. Operational risk conductors—HF and ICT—transmit horizontally within an enterprise from one business unit to another, potentially amplifying internal incidents from manageable to crisis/disaster proportions. Operational risk conductors may also transmit vertically, away from the enterprise up to the client base and downwards into the supply chain, transmitting impacts to both customers and partners/suppliers. Operational risk conductors are not necessarily a new phenomena, but they have taken on considerably greater significance under the rapid convergence of information and communication assets to Internet Protocol (IP), which has catalyzed a feedback-loop between HF and ICT. As an incident typically possesses both HF and ICT impacts, HF and ICT in turn impact each other, multiplying the scope and scale of the impact. In addition to presenting a framework for understanding and managing operational risks and resiliency, this paper proposes a cause-and-effect relationship between IP convergence and the materialization of operational risk conductors.
类似于声音通过钢琴线产生共鸣,物理(洪水、破坏/破坏、爆炸、流行病等)和逻辑(网络/软件/数据)事件的影响通过“风险传导者”在企业和业务层次之间产生共鸣。风险导体分为两级:关键基础设施(CI)作为行业风险导体,组织内部操作风险导体以人为因素(HF)和信息通信技术(ICT)的形式存在。风险传导者,无论是工业的还是操作的,都是以地理为中心的、物理的或逻辑的影响的分散媒介。在整个经济中,关键的基础设施可能会将影响从一个企业传递到另一个企业。操作风险传导器——高频和信息通信技术——在企业内部从一个业务部门横向传播到另一个业务部门,潜在地将内部事件从可管理扩大到危机/灾难的比例。操作风险传导者也可能垂直传播,从企业向上传播到客户群,向下传播到供应链,将影响传递给客户和合作伙伴/供应商。操作风险导体不一定是一个新现象,但在信息和通信资产向互联网协议(IP)的快速融合下,它们具有相当大的意义,这促进了高频和ICT之间的反馈回路。由于一个事件通常同时具有高频和ICT的影响,因此高频和ICT相互影响,从而使影响的范围和规模成倍增加。除了提出理解和管理操作风险和弹性的框架外,本文还提出了IP融合与操作风险导体物质化之间的因果关系。
{"title":"Risk Conductors","authors":"T. Macaulay","doi":"10.1080/10658980601051409","DOIUrl":"https://doi.org/10.1080/10658980601051409","url":null,"abstract":"Abstract Akin to sound resonating through a piano wire, impacts from both physical (flood, vandalism/sabotage, explosions, pandemics, etc.) and logical (network/software/data) incidents resonate between and through enterprises and business hierarchies via “risk conductors.” There are two orders of risk conductor: Critical Infrastructure (CI) as the industrial risk conductors, and intra-organizational operational risk conductors in the form of Human Factors (HF) and Information and Communication Technology (ICT). Risk conductors, either industrial or operational, are the dispersal agents of geographically centered, physical, or logical impacts. Critical infrastructures may transmit an impact from one enterprise to another throughout an economy. Operational risk conductors—HF and ICT—transmit horizontally within an enterprise from one business unit to another, potentially amplifying internal incidents from manageable to crisis/disaster proportions. Operational risk conductors may also transmit vertically, away from the enterprise up to the client base and downwards into the supply chain, transmitting impacts to both customers and partners/suppliers. Operational risk conductors are not necessarily a new phenomena, but they have taken on considerably greater significance under the rapid convergence of information and communication assets to Internet Protocol (IP), which has catalyzed a feedback-loop between HF and ICT. As an incident typically possesses both HF and ICT impacts, HF and ICT in turn impact each other, multiplying the scope and scale of the impact. In addition to presenting a framework for understanding and managing operational risks and resiliency, this paper proposes a cause-and-effect relationship between IP convergence and the materialization of operational risk conductors.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82497971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees' email usage is not putting your company at risk 企业电子邮件管理者的七个非常成功的习惯:确保你的员工使用电子邮件不会给你的公司带来风险
Q4 Social Sciences Pub Date : 2006-12-01 DOI: 10.1080/10658980601051359
J. Vandermeer
Abstract The rise of regulatory oversight and privacy concerns, the exponential growth in the amount of email, the lack of email discipline by employees, and the ubiquity of email as a primary communications mechanism have created new risks for companies and businesses of every size. It is not only the disgruntled worker you should be worried about—it is likely your star performers who are unknowingly placing your company at risk while just trying to do their jobs. They are emailing data to their personal accounts and/or to customers or partners, all in the clear and often without anyone knowing until it is too late to stop the security or ethical breach.
监管监督和隐私问题的增加,电子邮件数量的指数级增长,员工对电子邮件纪律的缺乏,以及电子邮件作为主要通信机制的普遍存在,给各种规模的公司和企业带来了新的风险。你应该担心的不仅仅是那些心怀不满的员工,你的明星员工可能会在不知不觉中把公司置于危险之中,而他们只是在努力做好自己的工作。他们将数据通过电子邮件发送到他们的个人账户和/或客户或合作伙伴,一切都很清楚,而且通常没有人知道,直到为时已晚,无法阻止安全或道德违规。
{"title":"Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees' email usage is not putting your company at risk","authors":"J. Vandermeer","doi":"10.1080/10658980601051359","DOIUrl":"https://doi.org/10.1080/10658980601051359","url":null,"abstract":"Abstract The rise of regulatory oversight and privacy concerns, the exponential growth in the amount of email, the lack of email discipline by employees, and the ubiquity of email as a primary communications mechanism have created new risks for companies and businesses of every size. It is not only the disgruntled worker you should be worried about—it is likely your star performers who are unknowingly placing your company at risk while just trying to do their jobs. They are emailing data to their personal accounts and/or to customers or partners, all in the clear and often without anyone knowing until it is too late to stop the security or ethical breach.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85810303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Journal of Information Systems Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1