skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 99297 Find in a Library
Title: Protecting Information in the Electronic Workplace - A Guide for Managers
Author(s): J A Schweitzer
Date Published: 1983
Page Count: 150
Sponsoring Agency: Reston Publishing Co, Inc
Reston, VA 22090
Sale Source: Reston Publishing Co, Inc
11480 Sunset Hills Road
Reston, VA 22090
United States of America
Language: English
Country: United States of America
Annotation: This book defines and illustrates the various systems products included in office automation, word processing, and management workstations; it proposes a program for electronic information security.
Abstract: Attention is directed to the influence of computer technology in the workplace and the value of information; personal workstation automation (PWA) systems and components; and descriptions of PWA communication, information storage, computing, software creation, and systems integration functions. A structure for information security management is proposed that consists of policy documentation, implementation and modification, program maintenance, and program review. Physical, logical, and procedural security measures then are delineated. Physical measures include restricting physical access to a place or object; logical security measures restricting access to information, such as the use of software systems that implement access control through passwords, fingerprint or voice recognition; and procedural security measures providing controls over authorization to see or use information. Cases of computer-related fraud illustrate such common methodologies as introduction of unauthorized inputs, manipulation of inputs during data entry, diversion of outputs, and manipulation of hardware and systems software. A primer for protecting information in PWA systems is provided, along with examples of the application of physical, logical, and procedural security elements. Diagrams, tables, 29 references, and an index are provided. Appendixes include model security policy and standards, an employee security booklet, and a security checklist.
Index Term(s): Computer crime prevention measures; Computer privacy and security; Computer related crime; Computer software; Information processing; Security management
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.