Information security baselines

Article Properties
Abstract
Cite
Fitzgerald, Kevin J. “Information Security Baselines”. Information Management &Amp; Computer Security, vol. 3, no. 2, 1995, pp. 8-12, https://doi.org/10.1108/09685229510088575.
Fitzgerald, K. J. (1995). Information security baselines. Information Management &Amp; Computer Security, 3(2), 8-12. https://doi.org/10.1108/09685229510088575
Fitzgerald KJ. Information security baselines. Information Management & Computer Security. 1995;3(2):8-12.
Description

Concerned about information security threats? This article describes a set of baseline threats and presents the reasoning behind the baseline security approach. It discusses an example of the acceptance of the security baseline approach and suggests how it can be used. The advantages and disadvantages of the approach are also considered, ultimately concluding that a baseline approach is worth considering as a way forward. The findings offer an objective security in a worthy of consideration as a way forward.

Citations
Citations Analysis
The first research to cite this article was titled Erratum and was published in 1997. The most recent citation comes from a 2022 study titled Erratum . This article reached its peak citation in 2002 , with 3 citations.It has been cited in 8 different journals. Among related journals, the Information Management & Computer Security cited this research the most, with 3 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year