Trust or bust

November 2006
Marketing Management;Nov/Dec2006, Vol. 15 Issue 6, p5
The article discusses a study by the Chief Marketing Officer Council concerning information security breaches. The study found that 80% of top marketers believe security concerns are rising for their companies and customers, but only 20% of companies have addressed the issue in their messaging and marketing communications. Furthermore, only one third of respondents said their company had a crisis containment plan for security break-ins and failures, even though most believe that security represents a prime opportunity for positive differentiation.


Related Articles

  • Access-control-based Efficient Privacy Protection Method for Social Networking Services. Yu-Jong Jang; Jin Kwak // International Journal of Security & Its Applications;Sep2013, Vol. 7 Issue 5, p305 

    There has been a recent surge in the popularity of social networking services (SNSs) and SNSs have grown rapidly, as has the variety of information shared through SNSs. However, SNSs raise concerns about the security and privacy of users because the information written by the user might be...

  • Ephemeral Key.  // Network Dictionary;2007, p178 

    A definition of the term "Ephemeral Key" is presented. It refers to a public key or a private key that is relatively short-lived.

  • Consolidating identity management will help banks manage security operations.  // MarketWatch: Financial Services;Aug2007, Vol. 6 Issue 8, p5 

    The article discusses the need of banks to invest in consolidating identity management to help them manage security operations. It is stated that using strong management for both customers and employees is significant for banks, to ensure that they can monitor and analyze who is accessing their...

  • Making Sense of Data Privacy CLAUSES. Chabinsky, Steven // Security: Solutions for Enterprise Security Leaders;Dec2015, Vol. 52 Issue 12, p34 

    The article offers several tips for create measures to ensure data privacy, highlighting the acronym CLAUSES. These tips include determining the types of data that will be collected, reflecting on one's ability to identify the location of the data to be collected, and having a form of access...

  • HAS THE TIME COME? MIMOSO, MICHAEL S. // Information Security;Jul2009, Vol. 11 Issue 7, p20 

    The article presents the Domain Name System Security Extensions (DNSSEC) as a solution to DNS security problems. It cites Dan Kaminsky's cache-poisoning bug that exposed DNS' shortcomings and renewed interest in DNSSEC to address the core problems on the Internet in a systematic and scalable...

  • Into the BREACH. Spurrier, Nate // Canadian Underwriter;Sep2014, Vol. 81 Issue 9, p56 

    The article focuses on the data breach viewpoint and assesses what business policyholders may come upon if an exposure occurs. Topics discussed include the factors causing a data breach, how businesses should respond to data exposure, and the various business insurance solutions offering...

  • CORRECTIONS.  // Advertising Age;12/3/2012, Vol. 83 Issue 43, p28 

    A correction is presented to the article "How to Train Your CEO: A Few Tips for the CMO Who Wants to Survive" on marketing management published in the November 26, 2012 issue.

  • Ensuring Data Integrity in a Regulated Environment. McDowall, R. D. // Scientific Computing;Mar/Apr2011, Vol. 28 Issue 2, p4 

    The article discusses several essential compliance areas to ensure data integrity generated by a chromatography data system (CDS) following the implementation of regulatory changes in the U.S. These include the identification of each user, implementation of adequate password controls, and...

  • CAMAC: A Context-Aware Mandatory Access Control Model. Jafarian, Jafar Haadi; Amini, Morteza // ISeCure;Jan2009, Vol. 1 Issue 1, p35 

    Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics