Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Personnel considerations in information systems security

Personnel considerations in information systems security In an area where internal control should be considered absolutely mandatory, it is ironic to note that management in many cases has let the mystique of the computer and the resultant associated loftiness of the technical staff discourage them from raising questions about the security of their information systems. As a result, top management is unaware, in many cases, that internal controls in the EDP department are lacking. It is not the intent of this paper to cover the entire area of computer security but only to make managers more aware of what they can do to help control their own personnel in the areas of internal security and internal controls. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

Personnel considerations in information systems security

ACM SIGSAC Review , Volume 1 (4) – Sep 1, 1982

Loading next page...
 
/lp/association-for-computing-machinery/personnel-considerations-in-information-systems-security-WBMWMuQPxv

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 1982 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/1058392.1058396
Publisher site
See Article on Publisher Site

Abstract

In an area where internal control should be considered absolutely mandatory, it is ironic to note that management in many cases has let the mystique of the computer and the resultant associated loftiness of the technical staff discourage them from raising questions about the security of their information systems. As a result, top management is unaware, in many cases, that internal controls in the EDP department are lacking. It is not the intent of this paper to cover the entire area of computer security but only to make managers more aware of what they can do to help control their own personnel in the areas of internal security and internal controls.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Sep 1, 1982

There are no references for this article.