Skip to main content

Abstract

The Managing Committee for Internet Use in Brazil has verified a migration of the target of attacks from the larger companies to individuals and small and medium (S&M) sized companies, largely due to a lack of security in relation to Internet access. Most of the S&M companies have a total lack of a culture of security. They tend to have problems with employees accessing Internet sites with inappropriate content matter, as well as the unauthorized on-job utilization of instant communicators. This means that it has become relatively easier and more efficient to attack residential and small business users directly. True digital inclusion must be based on an education consistent with the safe and adequate use of computational resources, not just their availability: this will contemplate both the existing networked companies and entrepreneurial networks. Governmental organs are taking initiatives to facilitate the acquisition of informational products by smaller companies and the population in general, but educational campaigns are also necessary so that such resources will truly bring about an economic and social evolutionThis work deals with these concerns and intends to instigate a reflection about the evolvement of society information processing and its related securities aspects (the motivation of why security is important in such a context) as well as on the negative social impact on S&M companies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Previdelli, José J.; Meurer, Vilma – “Gestão do Micro, Pequena e Média empresa no Brasil – Uma abordagem Multidimensional”. UNICORPORE, 2006

    Google Scholar 

  2. Balloni, Antonio José, “Por que GESITI?” Edit. Komedi - 2006

    Google Scholar 

  3. Laudon, Kenneth et al, “MIS:Managing the Digital Firm Active Book,ed. Pearson – Prentice Hall - 2004

    Google Scholar 

  4. Chagas, Fernando Celso Dolabela – “O Segredo de Luíza”. Cultura Editora Associadas, 1999.

    Google Scholar 

  5. a) - Fontes, Edson; Balloni, A. J. – “Security in Information Systems: Sociotechnical Aspects” accepted for publication in International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CIS2E 06) - Sponsored by: IEEE/University of Bridgeport - December 4 - 14, 2006, b) - Balloni, Antonio José,” Por que GESITI? – Segurança, Inovação e Sociedade”, Edit. Komedi – 2007.

    Google Scholar 

  6. Schneier, Bruce Segurança.com: Segredos e mentiras sobre a proteção na vida digital. São Paulo: Editora Campus, 2001.

    Google Scholar 

  7. O’brien, James A., Sistemas de Informação, e as gerenciais na era da Internet. São Paulo: Editora Saravia, 2004.

    Google Scholar 

  8. Raymond, McLeod et al, “Managing Information Systems” Prentice Hall – 2004

    Google Scholar 

  9. Industrial Espionage: a)–http://www.sans.org/newsletter/newsbites/newsbites.php?vol=7&issue=19.Lastaccess:OCT.20th,2006 - Last access: OCT.20th,2006 b) - South Korea case:http://www.atimes.com/atimes/Korea/FF09Dg03.html , Last access:OCT.20th,2006 c)-http://www.lubrinco.com/articles/Security Management Online Business Practice Reference.pdf , - Last access:OCT.20th,2006

  10. Security Review, Modulo Security, julho/agosto de 2006.

    Google Scholar 

  11. a) - Security Review, Modulo Security, março/abril de 2006. b) -http://www.cartilha.cert.br/ - Last access: OCT. 20th, 2006

  12. Brazilian Internet Steering Committee, Survey on the Use of Information and Communication Technologies in Brazil, 2005 – ICT HOUSEHOLDS and ICT ENERPRISES.www.cgi.br/

  13. http://www.bndes.gov.br,Last access: OCT. 20th, 2006.

  14. http://www.sebrae.com.br,Last access: OCT. 20th, 2006.

  15. Sêmola, Marcos, Gestão da Segurança da Informação, uma visão executiva. Rio de Janeiro: Editora CAMPUS, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media B.V.

About this paper

Cite this paper

Beneton, E.J., Balloni, A.J., Bacic, M.J. (2008). Information Security In S&M Brazilian Companies. In: Elleithy, K. (eds) Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8735-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8735-6_22

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8734-9

  • Online ISBN: 978-1-4020-8735-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics