{"title":"Thinking Beyond Security","authors":"R. Ramanathan","doi":"10.1201/1086.1065898X/46051.15.2.20060501/93408.7","DOIUrl":null,"url":null,"abstract":"Abstract A competitive business views information technology (IT) as an integral part of itself in achieving the business mission. On the other hand, IT cannot stand up to the service level agreement (SLA) with the business units if it views solutions in an ad hoc way [1]. In a time where the IT as a business enabler and enhancer is the target of unanticipated attacks from various agents, the entity at risk is the business itself and the trust the business has developed so far in the IT [2]. Government initiatives, such as the Critical Infrastructure Protection Act [3], include even the assets owned by private industry, such as those of major banking and energy sectors, as a part of the national asset. They mandate that companies take initiatives to protect and make information resources available, despite possibilities of threats [4].","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Systems Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086.1065898X/46051.15.2.20060501/93408.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract A competitive business views information technology (IT) as an integral part of itself in achieving the business mission. On the other hand, IT cannot stand up to the service level agreement (SLA) with the business units if it views solutions in an ad hoc way [1]. In a time where the IT as a business enabler and enhancer is the target of unanticipated attacks from various agents, the entity at risk is the business itself and the trust the business has developed so far in the IT [2]. Government initiatives, such as the Critical Infrastructure Protection Act [3], include even the assets owned by private industry, such as those of major banking and energy sectors, as a part of the national asset. They mandate that companies take initiatives to protect and make information resources available, despite possibilities of threats [4].