Information security in business environments

Article Properties
Abstract
Cite
Sanderson, Ethan, and Karen A. Forcht. “Information Security in Business Environments”. Information Management &Amp; Computer Security, vol. 4, no. 1, 1996, pp. 32-37, https://doi.org/10.1108/09685229610114187.
Sanderson, E., & Forcht, K. A. (1996). Information security in business environments. Information Management &Amp; Computer Security, 4(1), 32-37. https://doi.org/10.1108/09685229610114187
Sanderson E, Forcht KA. Information security in business environments. Information Management & Computer Security. 1996;4(1):32-7.
Description

Navigate the evolving landscape of information security with proactive strategies and vigilance. This article presents a fresh perspective on the threats and security measures essential for safeguarding sensitive information in today's dynamic technological environment. It emphasizes the necessity of proactive security implementations, cautioning against the challenges presented by converging business markets and technologies. Key topics include security policies, privacy protocols, security logs, encryption methods, virus attack responses, and Internet security concerns. The analysis extends to firewalls and auditing techniques. The proactive strategies ensure robust defense mechanisms are in place. Outlining the work of the Computer Emergency Response Team and the Computer Incident Advisory Capability in the USA, the paper emphasizes the significance of vigilance and rapid response in mitigating threats. This forward-thinking approach ensures sustained data protection. This comprehensive view empowers organizations to safeguard their valuable information assets.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Internet security: a case study of firewall selection and was published in 1998. The most recent citation comes from a 2020 study titled Internet security: a case study of firewall selection . This article reached its peak citation in 2006 , with 2 citations.It has been cited in 7 different journals. Among related journals, the Industrial Management & Data Systems cited this research the most, with 3 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year