Will Your Information Survive?

Oliva, Ralph A.
January 2003
Marketing Management;Jan/Feb2003, Vol. 12 Issue 1, p42
Talks about risk management and the creation of frameworks for information survival as a part of management practice. Discussion on survival and security in information technology; Purpose of shifts in thinking in relation to information survival according to Carol Sledge from the Software Engineering Institute at Carnegie Mellon University in Pennsylvania. INSET: Resources: Information Survival.


Related Articles

  • DANGER WITHIN. Cotriss, David // SC Magazine: For IT Security Professionals (15476693);Jul2012, Vol. 23 Issue 7, p33 

    The article focuses on insider threat for data security. It discusses accidental data breaches of employees of which employers are allegedly not prepared to deal with. It also explores strategies to minimize insider threats, citing recommendations of the Computer Emergency Response Team (CERT)...

  • Telcordia software wins high rank.  // RCR;06/07/99, Vol. 18 Issue 23, p33 

    Reports that Telcordia Technologies Inc.'s software development group earned a level-five rating from Carnegie Mellon University's Software Engineering Institute in Pittsburgh, Pennsylvania.

  • Still No Silver Bullet: Managing and Improving the Software Development Process. Woods, W. Addison // Armed Forces Comptroller;Winter99, Vol. 44 Issue 1, p33 

    Reveals how the Capability Maturity Model (CMM) designed by Carnegie Mellon University's Software Engineering Institute (SEI) in Pittsburg, Pennyslvania can be applied to improve and manage software development efforts. Characteristics of CMM; Software quality assurance; Conclusion.

  • Telcordia earns highest level of quality recognition.  // Quality Progress;Aug99, Vol. 32 Issue 8, p18 

    Reports that Morristown, New York-based software firm Telcordia Technologies Inc. has received a level-five capability maturity model (CMM) rating from the Carnegie Mellon Software Engineering Institute. Meaning of CMM; Profile on Telcordia.

  • Model improvement. Callaway, Erin // PC Week;6/19/95, Vol. 13 Issue 24, pE/7 

    Focuses on Carnegie Mellon University, Software Engineering Institute's Capability Maturity Model. Use of the model in the evaluation and revamping of software-development processes; Texas Instruments Inc. as one example of successful implementation of the model; Benefits from its use.

  • DDoS Attacks - What You Can't See Can Hurt You? Larson, Dave // Database & Network Journal;Jun2015, Vol. 45 Issue 3, p17 

    The article focuses on a report published by the Software Engineering Institute at Carnegie Mellon University on Distributed Denial of Service (DDoS), in which an enemy runs a computer program from a remote location that jams the service on the victim computer. It reflects on the need of...

  • Enterprise Risk Management & Governance advisory service.  // Cutter Benchmark Review;Dec2005, Vol. 5 Issue 12, p26 

    The article provides information about the Enterprise Risk Management & and Governance advisory service of the journal "Cutter Consortium" in the U.S. The service enables organizations to achieve a balance between managing critical enterprise risk and taking the risks necessary to remain...

  • Shine Those Skills. Shackleford, Dave // Information Security;Nov2007, Vol. 10 Issue 10, p12 

    The article presents the author's view about the need for chief information security officers (CISO) to acquire and apply risk management knowledge to their jobs in order to be considered strategic player in the information technology (IT) field. According to the author, security management has...

  • Get help with selling IT security to the board.  // Computer Weekly;4/22/2003, p56 

    Security is the top IT technical challenge for IT managers. However, in the wake of corporate risk management obligations and personal liabilities placed on company board directors following the England's stock exchange's Turnbull Report, IT security is pressing management and governance issue....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics