Violation of safeguards by trusted personnel and understanding related information security concerns

被引:53
|
作者
Dhillon, G [1 ]
机构
[1] Univ Nevada, Coll Business, Las Vegas, NV 89154 USA
关键词
D O I
10.1016/S0167-4048(01)00209-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A majority of computer security breaches occur because internal employees of an organization subvert existing controls. While exploring the issue of violation of safeguards by trusted personnel, with sprecific reference to Barings Bank and the activities of Nicholas Leeson, this paper provides an understanding of related information security concerns. In a final synthesis, guidelines art provided which organizations could use to prevent computer security breaches.
引用
收藏
页码:165 / 172
页数:8
相关论文
共 50 条
  • [1] From trusted information security controls to a trusted information security environment
    Von Solms, R
    Van De Haar, H
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 29 - 36
  • [2] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X
  • [3] Information Security: Risks Related to the Cultural of Personnel (Review)
    Astakhova, L. V.
    [J]. SCIENTIFIC AND TECHNICAL INFORMATION PROCESSING, 2015, 42 (02) : 41 - 52
  • [4] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    [J]. China Communications, 2013, 10 (11) : 11 - 12
  • [5] Understanding Information Security Policy Violation from a Situational Action Perspective
    Li, Han
    Luo, Xin
    Chen, Yan
    [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03): : 739 - 772
  • [6] Applications of trusted review to information security
    Yesberg, J
    Henderson, M
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 305 - 319
  • [7] Employee responses to information security related stress: Coping and violation intention
    Yazdanmehr, Adel
    Li, Yuan
    Wang, Jingguo
    [J]. INFORMATION SYSTEMS JOURNAL, 2023, 33 (03) : 598 - 639
  • [8] THE IMPACT OF OVERCLASSIFICATION ON PERSONNEL AND INFORMATION SECURITY
    KAISER, FM
    [J]. GOVERNMENT INFORMATION QUARTERLY, 1986, 3 (03) : 251 - 269
  • [9] Security and Privacy Concerns in Information Usability
    Yang, Liang-Chih
    [J]. 2024 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION WORKSHOPS, WACVW 2024, 2024, : 679 - 684
  • [10] An information flow security model to trusted computing system
    Hu Jun
    Shen Changxiang
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +