This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
An Information Security Strategy for Networkable Devices
September/October 2007 (vol. 5 no. 5)
pp. 50-56
Ilan Oshri, Rotterdam School of Management
Julia Kotlarsky, Warwick Business School
Corey Hirsch, LeCroy
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy.

1. J.A. Hoffer and D.W. Straub, "The 9 to 5 Underground: Are You Policing Computer Crimes?" Sloan Management Rev., vol. 30, no. 4, 1989, pp. 35–43.
1. J.A. Hoffer and D.W. Straub, "The 9 to 5 Underground: Are You Policing Computer Crimes?" Sloan Management Rev., vol. 30, no. 4, 1989, pp. 35–43.
1. J.A. Hoffer and D.W. Straub, "The 9 to 5 Underground: Are You Policing Computer Crimes?" Sloan Management Rev., vol. 30, no. 4, 1989, pp. 35–43.
2. S.D. Ryan and B. Bordoloi, "Evaluating Security Threats in Mainframe and Client/Server Environments," Information & Management, vol. 32, no. 3, 1997, pp. 137–146.
2. S.D. Ryan and B. Bordoloi, "Evaluating Security Threats in Mainframe and Client/Server Environments," Information &Management, vol. 32, no. 3, 1997, pp. 137–146.
2. S.D. Ryan and B. Bordoloi, "Evaluating Security Threats in Mainframe and Client/Server Environments," Information & Management, vol. 32, no. 3, 1997, pp. 137–146.
3. I. Arce, "The Rise of the Gadgets," IEEE Security & Privacy, vol. 1, no. 5, 2003, pp. 78–81.
3. I. Arce, "The Rise of the Gadgets," IEEE Security &Privacy, vol. 1, no. 5, 2003, pp. 78–81.
3. I. Arce, "The Rise of the Gadgets," IEEE Security & Privacy, vol. 1, no. 5, 2003, pp. 78–81.
4. D. Taylor and G. McGraw, "Adopting a Software Security Improvement Program," IEEE Security & Privacy, vol. 3, no. 3, 2005, pp. 88–91.
4. D. Taylor and G. McGraw, "Adopting a Software Security Improvement Program," IEEE Security &Privacy, vol. 3, no. 3, 2005, pp. 88–91.
4. D. Taylor and G. McGraw, "Adopting a Software Security Improvement Program," IEEE Security & Privacy, vol. 3, no. 3, 2005, pp. 88–91.
5. B. von Solms and R. von Solms, "From Information Security to Business Security," Computers & Security, vol. 24, no. 4, 2005, pp. 271–273.
5. B. von Solms and R. von Solms, "From Information Security to Business Security," Computers &Security, vol. 24, no. 4, 2005, pp. 271–273.
5. B. von Solms and R. von Solms, "From Information Security to Business Security," Computers & Security, vol. 24, no. 4, 2005, pp. 271–273.
6. A. McAdams, "Security and Risk Management: A Fundamental Business Issue," Information Management J., vol. 38, July/Aug. 2004, pp. 36–44.
6. A. McAdams, "Security and Risk Management: A Fundamental Business Issue," Information Management J., vol. 38, July/Aug. 2004, pp. 36–44.
6. A. McAdams, "Security and Risk Management: A Fundamental Business Issue," Information Management J., vol. 38, July/Aug. 2004, pp. 36–44.
7. B. von Solms and R. von Solms, "The Ten Deadly Sins of Information Security management," Computers & Security, vol. 23, no. 5, 2004, pp. 371–376.
7. B. von Solms and R. von Solms, "The Ten Deadly Sins of Information Security management," Computers &Security, vol. 23, no. 5, 2004, pp. 371–376.
7. B. von Solms and R. von Solms, "The Ten Deadly Sins of Information Security management," Computers & Security, vol. 23, no. 5, 2004, pp. 371–376.

Index Terms:
information security, networkable Windows-based operating systems, NWOS, vendor-user relationship
Citation:
Ilan Oshri, Julia Kotlarsky, Corey Hirsch, "An Information Security Strategy for Networkable Devices," IEEE Security & Privacy, vol. 5, no. 5, pp. 50-56, Sept.-Oct. 2007, doi:10.1109/MSP.2007.104
Usage of this product signifies your acceptance of the Terms of Use.