{"title":"Protecting information assets through effective computer security training","authors":"T. R. Walsh","doi":"10.1109/CCST.1994.363782","DOIUrl":null,"url":null,"abstract":"Once you give users access to your computer systems, you're vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology security. Because computer security training is usually mandatory, employee attitude affects what they'll get out of the training. Employees dread (and resist) computer security training. The author discusses how to deliver computer security training to users, to reduce the risks to your information systems.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1994.363782","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Once you give users access to your computer systems, you're vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology security. Because computer security training is usually mandatory, employee attitude affects what they'll get out of the training. Employees dread (and resist) computer security training. The author discusses how to deliver computer security training to users, to reduce the risks to your information systems.<>