skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 119330 Find in a Library
Title: Internal Corporate Security of Computers and Trade Secrets (From Prevention and Prosecution of Computer and High Technology Crime, P 7.1-7.54, 1989, Stanley S Arkin, et al. -- See NCJ-119326)
Author(s): S S Arkin; B A Bohrer; D L Cuneo; J P Donohoe; J M Kaplan; R Kasanof; A J Levander; S Sherizen
Date Published: 1989
Page Count: 54
Sponsoring Agency: Matthew Bender and Co, Inc
Albany, NY 12204
Sale Source: Matthew Bender and Co, Inc
1275 Broadway
Albany, NY 12204
United States of America
Type: Issue Overview
Language: English
Country: United States of America
Annotation: Corporate security related to computer systems, computerized data, and trade secrets is explained in terms of its basic principles and practical approaches, as well as the need for information security to be part of corporate strategic planning.
Abstract: Information security receives inadequate support from most corporations, although top management is concerned about security. However, top management often believes that its data processing operations are much more tightly controlled than do the heads of internal audit departments and data processing managers. Top management needs to recognize that changes related to computer technology and liabilities require new corporate efforts to protect information. Major assets and resources affected by computerization include information, services, negotiables, personnel, inventories, and equipment. Potential proprietary information requiring protection includes financial information, organizational information, marketing information, and technical information. Security measures should include organizational measures, security administration, personnel security, physical security, environmental controls, disaster controls, communications security, and computer security. Protective strategies include containment, deterrence, obfuscation, and recovery. The major approaches to information security are based on physical security, procedural security, technical security, telecommunications security, and contingency planning. A program to protect information should use four steps: planning, implementation, evaluation, and reporting. List of professional organizations and 16 references.
Main Term(s): Data security
Index Term(s): Business security; Computer crime prevention measures; Computer privacy and security; Confidential records access
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=119330

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.