Access the full text.
Sign up today, get DeepDyve free for 14 days.
Today, information technology is fundamental to the operation of most businesses, whether they are small companies or multinational corporations. In recent times, the implementation of local and wide area networks and the installation of computing equipment in office areas has brought information technology to nearly every working environment. The result is an increasing dependence on the availability, integrity and confidentiality of information stored and processed by these systems. As the trend shifts from “fortress” style central computer facilities to distributed systems located in generally less secure office environments, the risk of disruption increases, owing to lack of physical security, support services limitations and absence of site monitoring. The net result is higher business impact coupled with greater exposure. Identifies the elements that are at risk, discusses the issues businesses face when seeking to minimize exposures, suggests some practical solutions and describes some selected events that illustrate the hazards associated with having inadequate protection.
Internet Research – Emerald Publishing
Published: Mar 1, 1996
Keywords: Access control; Computer hardware; Information technology; Location; Risk
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.