{"title":"Theft of data in cyberspace: Management's role","authors":"August Bequai","doi":"10.1016/S0960-2593(97)87191-1","DOIUrl":null,"url":null,"abstract":"<div><p>Securing data in Cyber-space can frequently prove difficult. It can also prove costly, especially where high-tech security systems are involved. A meaningful data security program must, by necessity, also incorporate an array of personnel safeguards.</p></div>","PeriodicalId":100310,"journal":{"name":"Computer Audit Update","volume":"1997 10","pages":"Pages 25-27"},"PeriodicalIF":0.0000,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0960-2593(97)87191-1","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Audit Update","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0960259397871911","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Securing data in Cyber-space can frequently prove difficult. It can also prove costly, especially where high-tech security systems are involved. A meaningful data security program must, by necessity, also incorporate an array of personnel safeguards.