{"title":"分类和保护信息","authors":"","doi":"10.4018/978-1-5225-8410-0.ch009","DOIUrl":null,"url":null,"abstract":"This chapter focuses on the classification and security stage in the information lifecycle. The chapter identifies the key questions to answer in formulating an information strategy. Concepts associated with these issues and the consequences of ignoring them are explained. The issues are also interpreted in different internal operating environments and in the context of future business environments.","PeriodicalId":122413,"journal":{"name":"Strategic Management of Business-Critical Information Assets","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Classifying and Securing Information\",\"authors\":\"\",\"doi\":\"10.4018/978-1-5225-8410-0.ch009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This chapter focuses on the classification and security stage in the information lifecycle. The chapter identifies the key questions to answer in formulating an information strategy. Concepts associated with these issues and the consequences of ignoring them are explained. The issues are also interpreted in different internal operating environments and in the context of future business environments.\",\"PeriodicalId\":122413,\"journal\":{\"name\":\"Strategic Management of Business-Critical Information Assets\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Strategic Management of Business-Critical Information Assets\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-5225-8410-0.ch009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Strategic Management of Business-Critical Information Assets","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-5225-8410-0.ch009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This chapter focuses on the classification and security stage in the information lifecycle. The chapter identifies the key questions to answer in formulating an information strategy. Concepts associated with these issues and the consequences of ignoring them are explained. The issues are also interpreted in different internal operating environments and in the context of future business environments.