Economics And Technology

Krapf, Eric
April 2007
Business Communications Review;Apr2007, Vol. 37 Issue 4, p4
Trade Publication
The author reflects on the relationship between computer security services and economics. He argues that the technical means of computer security can only be effective if they're used in service of ends crafted at the business level. He also believes that the most important part of a computer security strategy is risk assessment.


Related Articles

  • Eliminate mobile app threats. Walsh, Jack // Sports Car;Dec2013, Vol. 24 Issue 12, p50 

    In this article, the author reflects on the need to eliminate mobile device applications threats in business organizations. He states that the technology research firm Gartner Inc. has predicted that 25 percent of enterprises will have a mobile enterprise application stores (EAS) by 2017. He...

  • The changing face of data protection. Wood, Denise // Sports Car;Dec2013, Vol. 24 Issue 12, p16 

    In this article, the author focuses on the changing aspects of business and consumer data protection. She informs that information technology (IT), sakes and customer services departments should know IT security policies and standards and she states that businesses should be aware of latest...

  • Understanding Data Governance and Stewardship, Part 1. Marco, David // DM Review;Sep2006, Vol. 16 Issue 9, p28 

    The article provides information on the processes of data governance and stewardship. The relevance of data governance to an organization include understanding of common data quality, improvement of data accuracy, consolidation of redundancy in common data and the identification of costs. The...

  • RSA Dismisses Researchers' SecurID Attack Claims.  // CIO Insight;6/28/2012, p1 

    The article discusses the claim of Sam Curry, chief technology officer of Identity and Data Protection unit of network security company RSA Security LLC, against the research on modified version of the Bleichenbacher RSA PKCS#1v1.5 attack strategy to access encryption keys. He emphasizes the...

  • The worst happens What next? Morbin, Tony // SC Magazine: For IT Security Professionals (UK Edition);Sep/Oct2014, p25 

    The article discusses how to respond to and recover from cyber breaches. Topics discussed include cyber resilience, the four-step approach proposed by Bruce Schneier of Co3 Systems, and the utilization of best practice following resolution of vulnerabilities in the network or inside threat. Also...

  • Big blue calls for beefed-up security.  // Network World;04/13/98, Vol. 15 Issue 15, p6 

    Focuses on the call being made for unrestricted levels of United States (U.S) domestic encryption technology by chairman of the International Business Machines (IBM) Lou Gerstner, which would enable corporate network to better protect themselves from hackers.

  • droit : le référentiel général de sécurité. Thomas, Michel // Archimag;sep2012, Issue 257, p36 

    The article discusses the electronic security protocol le référentiel général de sécurité (RGS), which concerns electronic exchanges between users and administrators and between administrative authorities. Topics discussed include authentication and electronic signatures,...

  • IT controls cut costs.  // Accountancy;Mar1995, Vol. 115 Issue 1219, p72 

    The article describes the information security standard certification from the British Standards Institution titled "British Standards 7799 for Information Security Management." The accreditation covers the assessment of existing information technology security and the establishment of formal...

  • ON THE MEND. Stone, Adam // Information Security;Dec2005, Vol. 8 Issue 12, p50 

    The article focuses on the launch of a comprehensive risk assessment and revamped security management system by Novartis AG. Michael Rasmussen, vice president of enterprise risk and compliance management research at Forrester Research, believes that the company's risk management reflects the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics