skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 72636 Find in a Library
Title: Gap Between Computer People and Security People
Journal: Security Management  Volume:24  Issue:10  Dated:(October 1980)  Pages:50,52,55,57
Author(s): D F Poindexter
Date Published: 1980
Page Count: 4
Format: Article
Language: English
Country: United States of America
Annotation: The inclusion of data processing professionals on the security staff and the assignment of technical specialists to augment inspection programs and auditing has created certain communication problems which are addressed in this article.
Abstract: Problems are listing ranging from minor differences in the use of terminologies to differences in level of abstraction, in orientation, and in decisions based on different experience. For example, the security specialist may think of the concept of access control as beginning with front door entry controls and extend to authorizing users by means of a password. The data processing specialist, however, may be inclined to think of access control only as it relates to the data base itself. In addition, the data processing staff may be geared toward efficiency of operation, while the security specialist, also oriented toward efficiency, must be involved with certain restrictions that impede efficiency. Finally, the momentum of sets, a well-established principle of interpersonal communications, may result in individuals ignoring unusual occurrences that impinge on systems security. Because no one person can be responsible for all aspects of computer security, team cooperation and mutual belief in the value of the other person's viewpoint is important. Management responsibility lies in defining what level of restraint is acceptable and what information must be protected. The objective of computer security must be to make the possibility of gaining unauthorized access to particular data as difficult as possible. Six references are provided.
Index Term(s): Computer crime prevention measures; Computer privacy and security
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=72636

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.