{"title":"炼金术的艺术","authors":"Karen Lawrence Öqvist","doi":"10.1016/j.istr.2010.09.003","DOIUrl":null,"url":null,"abstract":"<div><p>Normally the focus of any organisation is on the protection of ‘hard’ information, e.g. intellectual property, within the implementation of their information security program. This article discusses how the potential risks associated with the leakage of ‘soft’ information (that in itself may hold no value) into the public domain is higher today than it has ever been before. The article also offers some measures that can be taken to mitigate these risks.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"15 2","pages":"Pages 47-50"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2010.09.003","citationCount":"2","resultStr":"{\"title\":\"The art of alchemy\",\"authors\":\"Karen Lawrence Öqvist\",\"doi\":\"10.1016/j.istr.2010.09.003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Normally the focus of any organisation is on the protection of ‘hard’ information, e.g. intellectual property, within the implementation of their information security program. This article discusses how the potential risks associated with the leakage of ‘soft’ information (that in itself may hold no value) into the public domain is higher today than it has ever been before. The article also offers some measures that can be taken to mitigate these risks.</p></div>\",\"PeriodicalId\":100669,\"journal\":{\"name\":\"Information Security Technical Report\",\"volume\":\"15 2\",\"pages\":\"Pages 47-50\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/j.istr.2010.09.003\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Security Technical Report\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1363412710000257\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Technical Report","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1363412710000257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Normally the focus of any organisation is on the protection of ‘hard’ information, e.g. intellectual property, within the implementation of their information security program. This article discusses how the potential risks associated with the leakage of ‘soft’ information (that in itself may hold no value) into the public domain is higher today than it has ever been before. The article also offers some measures that can be taken to mitigate these risks.