메뉴 건너뛰기




Volumn 17, Issue 3, 1998, Pages 207-210

Recent security surveys

(1)  Hinde, Stephen a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEMS; COMPUTER VIRUSES; ELECTRONIC COMMERCE; INFORMATION MANAGEMENT; INTERNET; LOCAL AREA NETWORKS; PERSONNEL; PERSONNEL TRAINING; PLANNING; PUBLIC POLICY; SOCIETIES AND INSTITUTIONS; SURVEYS;

EID: 0031628589     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(98)80311-8     Document Type: Editorial
Times cited : (6)

References (3)
  • 1
    • 0003627258 scopus 로고    scopus 로고
    • The Audit Commission, UK February Triennial survey of IT Fraud and Abuse in the United Kingdom. The report is based upon the responses to a detailed questionnaire by some 900 companies and public organizations. Available from the Audit Commission priced £15. Freephone (UK) 0800 502030.Whilst the Survey attempts to size computer abuse in the UK, it is far more useful in showing trends - it has been produced for nearly twenty years - and also for the case studies
    • Ghost in the Machine - an Analysis of IT Fraud and Abuse:The Audit Commission, UK (February 1998). Triennial survey of IT Fraud and Abuse in the United Kingdom. The report is based upon the responses to a detailed questionnaire by some 900 companies and public organizations. Available from the Audit Commission priced £15. Freephone (UK) 0800 502030.Whilst the Survey attempts to size computer abuse in the UK, it is far more useful in showing trends - it has been produced for nearly twenty years - and also for the case studies.
    • (1998) Ghost in the Machine - An Analysis of IT Fraud and Abuse
  • 2
    • 0008494910 scopus 로고    scopus 로고
    • This survey is the second of a biennial investigation into the current state of information security in UK organizations. It was conducted by KPMG's Information Risk Management group by way of a detailed postal questionnaire, which was completed and returned by over 1000 organizations the UK and Ireland, each with an annual turnover in excess of £10 million
    • The Information Security Survey by KPMG (1998).This survey is the second of a biennial investigation into the current state of information security in UK organizations. It was conducted by KPMG's Information Risk Management group by way of a detailed postal questionnaire, which was completed and returned by over 1000 organizations the UK and Ireland, each with an annual turnover in excess of £10 million.
    • (1998) The Information Security Survey by KPMG
  • 3
    • 85030043412 scopus 로고    scopus 로고
    • Information Security the True Cost To Business. The latest in a series of Information Security Surveys managed by the National Computing Centre (NCC) for the UK Department of Trade and Industry. This one is sponsored by AT&T, Sysdeco and the UK ITSEC Scheme. The Survey consisted of 1000 telephone interviews with people responsible for information security across a broad range of UK organizations, across all sectors. All interviewing was conducted by NOP using Computer Assisted Telephone Interviewing. Sampling was done from the Business Database, the most comprehensive database of UK IT sites, A qualitative follow up exercise was carried out by the NCC consisting of face to face interviews with representatives of 30 organizations which had suffered a security breach and 30 organizations which had an information security policy. These organizations were sourced from the quantitative survey
    • The Business Information Security Survey (BISS'98) - Information Security the True Cost To Business. The latest in a series of Information Security Surveys managed by the National Computing Centre (NCC) for the UK Department of Trade and Industry. This one is sponsored by AT&T, Sysdeco and the UK ITSEC Scheme. The Survey consisted of 1000 telephone interviews with people responsible for information security across a broad range of UK organizations, across all sectors. All interviewing was conducted by NOP using Computer Assisted Telephone Interviewing. Sampling was done from the Business Database, the most comprehensive database of UK IT sites, A qualitative follow up exercise was carried out by the NCC consisting of face to face interviews with representatives of 30 organizations which had suffered a security breach and 30 organizations which had an information security policy. These organizations were sourced from the quantitative survey.
    • The Business Information Security Survey (BISS'98)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.