INFORMATION SECURITY POLICY OF ORGANIZATION IN RELATION TO MARKETING COMMUNICATION

被引:0
|
作者
Blisak, L'uboslav [1 ]
Salgovicova, Jarmila [1 ]
机构
[1] Univ Ss Cyril & Methodius Trnava, Fac Mass Media Commun, Trnava 91701, Slovakia
关键词
Consumer protection; Credibility; Information security; Ethical approach; Legislation; Threats;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Currently, anybody may face security threats. All entities which keep or process sensitive data are potential targets. Threat of sensitive information leak is a complex issue. In this contribution, we deal with information security policy regarding the protection of customers and individual companies against threats associated with the leakage of sensitive information. We discuss the way-outs and legislative standards, and provide practical examples of dealing with violations to sensitive information, resulting in the damage to clients and the harm of goodwill. The last part of the article submits the proposals on how to reduce the risk of hacking threats to information databases, unauthorized access to sensitive personal data, secrets and patents, which might increase credibility of the organizations via applying moderate communication strategy.
引用
收藏
页码:526 / 539
页数:14
相关论文
共 50 条
  • [31] FROM INFORMATION POLICY TO INFORMATION MARKETING COMBINING DIFFERENT WORLDS
    JUCQUOISDELPIERRE, M
    INTERNATIONAL FORUM ON INFORMATION AND DOCUMENTATION, 1993, 18 (3-4): : 24 - 31
  • [32] Intensive Programme on Information and Communication Security
    Schlaeger, Christian
    Fuchs, Ludwig
    Pernul, Guenther
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 752 - 757
  • [33] An Organizational Communication Approach to Information Security
    Arhin, Kofi
    Wiredu, Gamel O.
    AFRICAN JOURNAL OF INFORMATION SYSTEMS, 2018, 10 (04): : 261 - 279
  • [34] Research on the Security of Information and Data in the Communication
    Han, Xiaoming
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 718 - 721
  • [35] Special Issue on Communication and Information Security
    Stavroulakis, Peter
    CHINA COMMUNICATIONS, 2008, 5 (02) : 4 - 7
  • [36] Information security policy -: what do international information security standards say?
    Höne, K
    Eloff, JHP
    COMPUTERS & SECURITY, 2002, 21 (05) : 402 - 409
  • [37] Marketing information and knowledge: Interrelation, management and ways of organization
    Kedaitiene, Angele
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 6, 2005, : 378 - 383
  • [38] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [39] Installing an appropriate information security policy
    Gaunt, N
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 1998, 49 (01) : 131 - 134
  • [40] PFIRES: A policy framework for information security
    Rees, J
    Bandyopadhyay, S
    Spafford, EH
    COMMUNICATIONS OF THE ACM, 2003, 46 (07) : 101 - 106