skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 119214 Find in a Library
Title: Crime Time
Journal: Computerworld: Focus on Integration (June 5, 1989)  Pages:30-32
Author(s): A Dooley
Date Published: 1989
Page Count: 3
Type: Survey
Format: Article
Language: English
Country: United States of America
Annotation: A survey of 214 information systems (IS) executives in charge of computer security in their organizations indicates that information security must be part of the corporate business plan and not just the responsibility of IS professionals.
Abstract: Almost 60 percent of respondents felt that computer security has not increased as a priority for top management. The 40 percent who saw a shift in priority reported that corporate executives were allocating more money, resources, time, and education to security. Although 81 percent said they had adequate security for their data and personal computer (PC) networks, only 64 percent reported a formal security plan in place. Keeping data accurate was considered to be more important than intentional security break-ins. The next most important issue was intentional crime by employees. Several respondents also mentioned they were concerned about data theft from competitors. Respondents who encountered security breaches dealt directly with the involved person, alerted the police or FBI, or took organizational action such as restricting further access and establishing a corporate security department. Nearly all respondents restricted access to information: 77 percent used audit trails; 81 percent allowed read only access; and 22 percent used encryption. Networked PC's pose a significant security risk, since an estimated 22.5 million PC's are used in U.S. organizations and about 20 percent of these computers are networked. Instead of viewing network security as a computer problem of hardware, software, and communications, companies must see it as a business problem.
Main Term(s): Computer privacy and security
Index Term(s): Computer crime prevention measures; Computer related crime
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.