TITLE

The other side of competitive vigilance

AUTHOR(S)
Lipman, Ira A.
PUB. DATE
January 1982
SOURCE
Advanced Management Journal (03621863);Winter82, Vol. 47 Issue 1, p4
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Offers an advice on protecting vital company documents from careless or corruptible employees, theft by outsiders, and natural disaster. Definition of trade secret; Consideration of the nature of the material being safeguarded and the location of the security site; Prevalence of computer crime.
ACCESSION #
4603306

 

Related Articles

  • The Enemy Within.  // Manager: British Journal of Administrative Management;Jan/Feb2001, Issue 23, p7 

    Reports the publication of 'The Enemy Within' booklet by Vogon International for the protection of businesses against computer-based fraud. Minimization of computer-based fraud; Background on the company; Efforts of the company to detect fraud, software theft and breach of copyright.

  • Divided, we fall. Antonopoulos, Andreas // Network World;10/29/2007, Vol. 24 Issue 42, p26 

    The author comments on the effort towards computer security by businesses and industries. He assserts that the balance between company privacy and involvement of law enforcement need to address this concern. He cites several reasons why a company would choose to keep things quiet about the...

  • Cyber Mercenaries to Challenge Enterprise Security in 2016. Srikanth, G. // Dataquest;12/15/2015, Vol. 33 Issue 23, p45 

    The article discusses cyber threats to enterprise security in 2016, by providing brief information on predictions related to threats such as attacks on all types of hardware, and mentions several best security practices for 2016 such as providing cyber security education.

  • Trickle of consumerisation may still turn into a flood. Bennett, Martha // Computer Weekly;11/8/2011, p8 

    In this article the author comments on the risks and challenges associated with consumerisation of companies in the U.S. The author mentions that the rise of consumerisation and personal device have associated headaches and challenges in terms of computer security. She states that preventive...

  • Businesses See a Significant Rise in Fraud and Risk Incidents in 2016.  // CFO Innovation Asia;1/19/2017, p1 

    The article reports that business enterprises and companies worldwide have experienced an increase in incidents related to cybercrime and fraud in 2016. The article further mentions the need for businesses to implement strategic risk management programs that can offer proper protection against...

  • Vpliv informacijskega bojevanja na slovenske organizacije. Bernik, Igor; Prislan, Kaja // Varstvoslovje: Journal of Criminal Justice & Security;2012, Vol. 14 Issue 3, p331 

    Purpose: The achievement of information superiority with information warfare methods is a form of organized cybercrime which is now becoming more obvious also in business environments. We present the current conditions regarding cybercrime and the awareness of this phenomenon in Slovenia, and...

  • CyberCrisis: Whose Job Is It, Anyway? McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Feb2011, Vol. 48 Issue 2, p10 

    The article offers the author's insights on cybercrimes and cyber security in organizations. The author mentions the Security 500 Report that identified that only 20% of respondents administered cyber security for their organizations, indicating that 80% of organizations do not view cybercrime...

  • DATA PROTECTION.  // Sports Car;Dec2013, Vol. 24 Issue 12, p41 

    The article reflects on tools and services provided for data protection. It informs that there are three modes of business data protection including ensuring that data is not exfiltrated from within the business, avoiding frauds that encourage careless behavior and a hybrid approach that...

  • Cybersecurity strategy lacks detail. Ashford, Warwick // Computer Weekly;12/6/2011, p8 

    The article reports that details for the achievement of goals are insufficient in security measures for cyberspace of Great Britain. It notes that Internet service providers (ISPs) have been requested by the government to offer business enterprises with more informed choices on criminal web...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics