Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection program success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view
The employee's role in protecting information assets
β Scribed by Belden Menkus
- Book ID
- 103576766
- Publisher
- Elsevier Science
- Year
- 1989
- Tongue
- English
- Weight
- 614 KB
- Volume
- 8
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
## Abstract This paper argues that creative behavior requires an employee to be willing to engage risk. Aside from the discussion of risk propensity as an individual difference, a new situational variable will be developed and tested: willingness to take risks (WTR). WTR captures the employee's wil
Information security and assurance are new frontiers for collaborative design. In this context, information assurance (IA) refers to methodologies to protect engineering information by ensuring its availability, confidentiality, integrity, non-repudiation, authentication, access control, etc. In col
## Abstract Reactions to training programs tend to be poor predictors of training success, yet most training programs are evaluated based solely on trainee reactions. In this study, we proposed that distinguishing between affective and cognitive employee reactions may improve the prediction of trai