Advertisement

Crime At Work pp 203-209 | Cite as

Security implementation in a computer environment: people not products

  • Sheridan Morris

Abstract

Security provision can be very expensive and often represents a major investment by a company. Whatever types of security measure are chosen -be they physical or electronic devices, procedural guidelines, in-house or contract security staff, or external consultancies — it is crucial that security needs are identified and measures tailored to meet them. In practice companies often do not attempt to detail their security problems and therefore the security measures adopted are ones of best fit rather than having been specifically designed to meet their needs. An effective security strategy needs to take account of these issues.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  1. Audit Commission (1990) Survey of computer fraud and abuse 1990. Bristol: Audit Commission.Google Scholar
  2. Cornwall, H. (1990) Data theft. London: Mandarin.Google Scholar
  3. Eloff, J.H.P. (1988) Computer security policy: important issues. Computers and Securiry, volume 7, pp. 559–562.CrossRefGoogle Scholar
  4. Minogue, M. (1993) Theory and practice in public policy and administration. In M. Hill (ed.) The policy process: a reader. Hertfordshire: Harvester Wheatsheaf.Google Scholar
  5. Norman, A.R.D. (1983) Computer Insecurity. London: Chapman and Hall.Google Scholar
  6. Smith, M.R. (1989) Commonsense Computer Securiry. London: McGraw-Hill Book Company.Google Scholar

Copyright information

© Macmillan Publishers Limited 2005

Authors and Affiliations

  • Sheridan Morris

There are no affiliations available

Personalised recommendations