Privacy through security: policy and practice in a small-medium enterprise.
Allison, Ian; Strangwick, Craig
The chapter discusses how one small business planned for, and implemented, the security of its data in a new enterprise-wide system. The companys data was perceived as sensitive, and any breach of privacy as commercially critical. From this perspective, the chapter outlines the organizational and technical facets of the policies and practices evidenced. Lessons for other businesses can be drawn from the case by recognizing the need for investments to be made that will address threats in business critical areas. By highlighting the need for organizations to understand the nature of the risk and the probability of an event occurring, the security approaches highlight the need to address both the threats and actions in the event of an incident to reduce the risk to privacy.
ALLISON, I. and STRANGWICK, C., 2008. Privacy through security: policy and practice in a small-medium enterprise. In Subramanian, R. (ed.) Computer security, privacy, and politics: current issues, challenges, and solutions. Hershey, PA: IGI Global [online], chapter 8, pages 157-179. Available from: https://doi.org/10.4018/978-1-59904-804-8.ch008
|Online Publication Date||Dec 31, 2008|
|Publication Date||Dec 31, 2008|
|Deposit Date||Apr 16, 2009|
|Publicly Available Date||Apr 16, 2009|
|Book Title||Computer security, privacy, and politics: current issues, challenges, and solutions|
|Chapter Number||Chapter 8|
|Keywords||Privacy; Security; Small medium enterprises|
ALLISON 2008 Privacy through security
Publisher Licence URL
You might also like
Migrating software products to the cloud: an adaptive STS perspective.
A virtual learning environment for introductory programming.
Automated software quality visualisation using fuzzy logic techniques.
Learning to improve software processes.