{"title":"防范漏洞:在线旅游服务的数据丢失预防","authors":"A. Chen, Huei-Chung Chu, Sou-Chein Wu","doi":"10.1109/ISIC.2012.6449761","DOIUrl":null,"url":null,"abstract":"Contemporary businesses have fully utilized information technologies and networks to integrate all the activities of business. The data flow spanning the whole value chain involves abundant confidential and sensitive information, which could cause grave aftermaths if critical information is leaked. This study provides a comprehensive approach for data leakage prevention by taking online travelling services as sample case. Three axes for all-over data leakage prevention is concluded as (1) Maintain secure physical environment; (2) Adopt adequate data leakage technologies; (3) Establish appropriate data protection arrangements and fulfill the requirements continuously.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Against the breaches: Data loss prevention for online travelling services\",\"authors\":\"A. Chen, Huei-Chung Chu, Sou-Chein Wu\",\"doi\":\"10.1109/ISIC.2012.6449761\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Contemporary businesses have fully utilized information technologies and networks to integrate all the activities of business. The data flow spanning the whole value chain involves abundant confidential and sensitive information, which could cause grave aftermaths if critical information is leaked. This study provides a comprehensive approach for data leakage prevention by taking online travelling services as sample case. Three axes for all-over data leakage prevention is concluded as (1) Maintain secure physical environment; (2) Adopt adequate data leakage technologies; (3) Establish appropriate data protection arrangements and fulfill the requirements continuously.\",\"PeriodicalId\":393653,\"journal\":{\"name\":\"2012 International Conference on Information Security and Intelligent Control\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Information Security and Intelligent Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIC.2012.6449761\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Information Security and Intelligent Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIC.2012.6449761","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Against the breaches: Data loss prevention for online travelling services
Contemporary businesses have fully utilized information technologies and networks to integrate all the activities of business. The data flow spanning the whole value chain involves abundant confidential and sensitive information, which could cause grave aftermaths if critical information is leaked. This study provides a comprehensive approach for data leakage prevention by taking online travelling services as sample case. Three axes for all-over data leakage prevention is concluded as (1) Maintain secure physical environment; (2) Adopt adequate data leakage technologies; (3) Establish appropriate data protection arrangements and fulfill the requirements continuously.