The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2007 vol.5)
pp: 50-56
Julia Kotlarsky , Warwick Business School
Corey Hirsch , LeCroy
ABSTRACT
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy.
INDEX TERMS
information security, networkable Windows-based operating systems, NWOS, vendor-user relationship
CITATION
Julia Kotlarsky, Corey Hirsch, "An Information Security Strategy for Networkable Devices", IEEE Security & Privacy, vol.5, no. 5, pp. 50-56, September/October 2007, doi:10.1109/MSP.2007.104
REFERENCES
1. J.A. Hoffer and D.W. Straub, "The 9 to 5 Underground: Are You Policing Computer Crimes?" Sloan Management Rev., vol. 30, no. 4, 1989, pp. 35–43.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool