TITLE

Effective Content Protection Controls

AUTHOR(S)
Mueller, Robert
PUB. DATE
December 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Dec2006, Vol. 43 Issue 12, p58
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents information on several ways for business enterprise to implement effective content protection controls. One is to identify content at risk such as source code, product plans, engineering drawings, product formulations and patent materials and database lists of customers and vendors. Deployment of risk management techniques is another important measure that should be taken by an enterprise.
ACCESSION #
23394218

 

Related Articles

  • Intellectual Property Risk.  // Risk Management (00355593);Dec2000, Vol. 47 Issue 12, p6 

    As more companies expand internationally, they risk cancellation of contracts as well as currency and political exposures. Political risk insurance, which provides coverage for adverse consequences of expansion, is an increasingly important tool for companies operating outside their native...

  • Content Monitoring Should Enable Risk Discovery. Howard, Matthew // Business Communications Review;Aug2006, Vol. 36 Issue 8, p58 

    The author reflects on enterprise resource management (ERM) in the U.S. ERM is becoming the new framework for information security as chief information officers confront concerns on regulatory compliance, corporate governance, intellectual property protection and infrastructure attacks. The aim...

  • Discussion of Information System Assurance for Enterprise Resource Planning Systems: Unique Risk Considerations. O'Leary, Daniel E. // Journal of Information Systems;Spring2002 Supplement, Vol. 16, p115 

    Asking experts their opinion is an important methodology in those settings where the major issues have not been previously addressed, often early in the topic's research life cycle. Heterogeneous expert opinion (HEO) refers to gathering the opinion of experts that derive from a number of...

  • FINDING THE SWEET SPOTS. Lundquist, Eric // eWeek;7/23/2007 Innovations, Vol. 24 Issue 25, p5 

    The article discusses the ways of controlling and improving business innovations of companies in the U.S. Due to stiff competition encountered by most companies, management innovated some ideas that would capture the hearts of the consumers. Ways of controlling innovation include leveraging...

  • Information System Assurance for Enterprise Resource Planning Systems: Unique Risk Considerations. Wright, Sally; Wright, Arnold M. // Journal of Information Systems;Spring2002 Supplement, Vol. 16, p99 

    Enterprise Resource Planning (ERP) systems inherently present unique risks due to tightly linked interdependencies of business processes, relational databases, and process reengineering. Knowledge of such risks is important in planning and conducting assurance engagements of the reliability of...

  • Auditing IT Governance. Iliescu, Florin-Mihai // Informatica Economica;2010, Vol. 14 Issue 1, p93 

    Effective IT governance helps ensure that IT supports business goals, optimizes business in-vestment in IT, and appropriately manages IT-related risks and opportunities. Organizations that realize the IT is no longer a support process and embeds value and risks need a structured approach for...

  • IT AS AN ENABLER. MORRISON, STEVE // Internal Auditor;Oct2014, Vol. 71 Issue 5, p9 

    A letter to the editor is presented in response to the article "Why Risk Management Technology Projects Fail."

  • Mobile communications: business enabler or corporate risk? Successful, risk-free exploitation of mobile technologies requires real cooperation between IT and the business to develop the right security policies. Wiltshire, Craig // IM@T.Online;Nov2007, p10 

    The article focuses on the need for the information technology sector and business enterprises to develop appropriate security policies. The need was attributed to risks of data theft and disruption caused by mobile technologies in corporate networks. One of the potential solutions cited is the...

  • Security risk mitigation for information systems. V. Page; M. Dixon; I. Choudhury // BT Technology Journal;Jan2007, Vol. 25 Issue 1, p118 

    Abstract  Security risk mitigation is a salient issue in systems development research. This paper introduces a lightweight approach to security risk mitigation that can be used within an Agile Development framework — the Security Obstacle Mitigation Model (SOMM). The SOMM uses the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics