Security implementation in a computer environment: people not products
Security provision can be very expensive and often represents a major investment by a company. Whatever types of security measure are chosen -be they physical or electronic devices, procedural guidelines, in-house or contract security staff, or external consultancies — it is crucial that security needs are identified and measures tailored to meet them. In practice companies often do not attempt to detail their security problems and therefore the security measures adopted are ones of best fit rather than having been specifically designed to meet their needs. An effective security strategy needs to take account of these issues.
Unable to display preview. Download preview PDF.
- Audit Commission (1990) Survey of computer fraud and abuse 1990. Bristol: Audit Commission.Google Scholar
- Cornwall, H. (1990) Data theft. London: Mandarin.Google Scholar
- Minogue, M. (1993) Theory and practice in public policy and administration. In M. Hill (ed.) The policy process: a reader. Hertfordshire: Harvester Wheatsheaf.Google Scholar
- Norman, A.R.D. (1983) Computer Insecurity. London: Chapman and Hall.Google Scholar
- Smith, M.R. (1989) Commonsense Computer Securiry. London: McGraw-Hill Book Company.Google Scholar