Abstract
A recent corporate trend emphasizes business restructuring and global strategies on a business level. There has been a tendency to decentralize control and put decision making closer to the operational centres. With modern information technology, especially telecommunications systems, decision making and operational control can be delegated to operational units and control information can be available to headquaters on a real time basis.[1]
Chapter PDF
Similar content being viewed by others
References
Management of Information Technology, Carol! W. Frenzel Boyd & Fraser Publishing Co, 1991, pp 475–476, pp 496–499
Design for dynamic user-role-based security, Imtiaz Mohammed & David M. Dills Computers & Security Volume 13 Number 8
The management of computer security profiles using a role-oriented approach, S.H. von Solms, Isak van der Merwe Computers & Security Volume 13 Number
MOSS II A Model for Open System Security, PWJ van Zyl, Dr MS Olivier, Prof SH von Solms
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Calitz, M., Solme, R., Solms, S.H. (1995). Security Management in a Distributed Open Environment. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_30
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_30
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive