The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Unified Information Security Management Plan
Abstract
Information is quickly becoming the most significant asset of business practice, and it must be protected and secured in order to be useful. Information security, intrusion detection, and privacy were in the top-10-issues list from the American Institute of Certified Public Accountants (AICPA) survey (“Information Security Heads Top 10,” 2003). Furthermore, the potential severity of attacks encourages collaboration between vendors and business clients, including educational institutions, in combating threats (Cox & Kistner, 2003). Essentially, transactions generate data that must be stored for future access in the form of information1. Therefore, data integrity is essential because it directly impacts information quality and any decisions based on that information (Brogan & Krupin, 2003; Ross, Stoneburner, Katzke, Johnson, & Swanson, 2003).
Related Content
Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar.
© 2025.
30 pages.
|
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala.
© 2025.
28 pages.
|
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh.
© 2025.
20 pages.
|
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian.
© 2025.
28 pages.
|
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain.
© 2025.
28 pages.
|
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur.
© 2025.
22 pages.
|
Djamel Saba, Abdelkader Hadidi.
© 2025.
28 pages.
|
|
|