{"title":"Against the breaches: Data loss prevention for online travelling services","authors":"A. Chen, Huei-Chung Chu, Sou-Chein Wu","doi":"10.1109/ISIC.2012.6449761","DOIUrl":null,"url":null,"abstract":"Contemporary businesses have fully utilized information technologies and networks to integrate all the activities of business. The data flow spanning the whole value chain involves abundant confidential and sensitive information, which could cause grave aftermaths if critical information is leaked. This study provides a comprehensive approach for data leakage prevention by taking online travelling services as sample case. Three axes for all-over data leakage prevention is concluded as (1) Maintain secure physical environment; (2) Adopt adequate data leakage technologies; (3) Establish appropriate data protection arrangements and fulfill the requirements continuously.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Information Security and Intelligent Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIC.2012.6449761","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Contemporary businesses have fully utilized information technologies and networks to integrate all the activities of business. The data flow spanning the whole value chain involves abundant confidential and sensitive information, which could cause grave aftermaths if critical information is leaked. This study provides a comprehensive approach for data leakage prevention by taking online travelling services as sample case. Three axes for all-over data leakage prevention is concluded as (1) Maintain secure physical environment; (2) Adopt adequate data leakage technologies; (3) Establish appropriate data protection arrangements and fulfill the requirements continuously.