{"title":"信息安全问题是管理失败的证据","authors":"CharlesCresson Wood","doi":"10.1016/0142-0496(95)80076-X","DOIUrl":null,"url":null,"abstract":"<div><p>What's the traditional response to the bringer of bad news? Shoot the messenger. With information security problems cropping up left and right like mushrooms on the forest floor, it's no wonder that a number of information security managers have recently been asked to find employment elsewhere. These firings are often window-dressing, not a serious attempt to solve the problem.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Pages 14-16"},"PeriodicalIF":0.0000,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80076-X","citationCount":"1","resultStr":"{\"title\":\"Information security problems as evidence of management failures\",\"authors\":\"CharlesCresson Wood\",\"doi\":\"10.1016/0142-0496(95)80076-X\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>What's the traditional response to the bringer of bad news? Shoot the messenger. With information security problems cropping up left and right like mushrooms on the forest floor, it's no wonder that a number of information security managers have recently been asked to find employment elsewhere. These firings are often window-dressing, not a serious attempt to solve the problem.</p></div>\",\"PeriodicalId\":100312,\"journal\":{\"name\":\"Computer Fraud & Security Bulletin\",\"volume\":\"1995 11\",\"pages\":\"Pages 14-16\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1995-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/0142-0496(95)80076-X\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud & Security Bulletin\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/014204969580076X\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud & Security Bulletin","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/014204969580076X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information security problems as evidence of management failures
What's the traditional response to the bringer of bad news? Shoot the messenger. With information security problems cropping up left and right like mushrooms on the forest floor, it's no wonder that a number of information security managers have recently been asked to find employment elsewhere. These firings are often window-dressing, not a serious attempt to solve the problem.