Shielding your company against information compromise

Article Properties
Abstract
Cite
Helms, Marilyn M., et al. “Shielding Your Company Against Information Compromise”. Information Management &Amp; Computer Security, vol. 8, no. 3, 2000, pp. 117-30, https://doi.org/10.1108/09685220010339228.
Helms, M. M., Ettkin, L. P., & Morris, D. J. (2000). Shielding your company against information compromise. Information Management &Amp; Computer Security, 8(3), 117-130. https://doi.org/10.1108/09685220010339228
Helms MM, Ettkin LP, Morris DJ. Shielding your company against information compromise. Information Management & Computer Security. 2000;8(3):117-30.
Description

Is your firm's competitive edge at risk? This paper highlights the growing threat of information theft in today's interconnected business world. It emphasizes the critical need for organizations to proactively implement robust defensive intelligence strategies. The study explores vulnerabilities, including employees and partners, that companies face in protecting sensitive knowledge from espionage. The research delves into specific defensive intelligence measures, such as controlling access to information systems and prioritizing security procedures. It also stresses the importance of companies understanding the challenges of defensive intelligence in a bureaucratic environment. In light of increasing reliance on information technologies and partnerships, the paper advocates for proactive measures to minimize the impact of successful espionage attempts. Ultimately, the findings underscore that safeguarding competitive information and intellectual property is essential for long-term prosperity. Implementing these measures and actions is vital for shielding a company against information compromise and gaining a sustainable competitive advantage. The paper calls for companies to view security not just as a cost, but as a strategic investment in the future.

"Information Management & Computer Security" focuses on safeguarding digital assets and managing risks. This paper directly aligns with the journal's core concerns by addressing the proactive protection of organizational knowledge. By examining vulnerabilities and suggesting defensive intelligence measures, the research offers practical insights into mitigating the threat of information theft, a key issue for the journal's readership. Citing references relating to digital assets management strengthens the relevance of this paper within the scope of the journal.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled An XML‐based architecture for data integration in vulnerability assessments and was published in 2005. The most recent citation comes from a 2019 study titled An XML‐based architecture for data integration in vulnerability assessments . This article reached its peak citation in 2018 , with 3 citations.It has been cited in 12 different journals, 16% of which are open access. Among related journals, the Journal of Strategic Marketing cited this research the most, with 2 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year