The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2007 vol.5)
pp: 50-56
Ilan Oshri , Rotterdam School of Management
Julia Kotlarsky , Warwick Business School
Corey Hirsch , LeCroy
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy.
information security, networkable Windows-based operating systems, NWOS, vendor-user relationship
Ilan Oshri, Julia Kotlarsky, Corey Hirsch, "An Information Security Strategy for Networkable Devices", IEEE Security & Privacy, vol.5, no. 5, pp. 50-56, September/October 2007, doi:10.1109/MSP.2007.104
1. J.A. Hoffer and D.W. Straub, "The 9 to 5 Underground: Are You Policing Computer Crimes?" Sloan Management Rev., vol. 30, no. 4, 1989, pp. 35–43.
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool