ITEM VIEW

The management of information security : a South African case study

dc.contributor.authorFourie, L. C. H.en_ZA
dc.date.accessioned2013-01-23T13:47:35Z
dc.date.available2013-01-23T13:47:35Z
dc.date.issued2003
dc.identifier.citationFourie, L. C. H. 2003. The management of information security : a South African case study. South African Journal of Business Management, 34(2):a679, doi:10.4102/sajbm.v34i2.679.
dc.identifier.issn2078-5976 (online)
dc.identifier.issn2078-5585 (print)
dc.identifier.otherdoi:10.4102/sajbm.v34i2.679
dc.identifier.urihttp://hdl.handle.net/10019.1/78039
dc.descriptionCITATION: Fourie, L. C. H. 2003. The management of information security : a South African case study. South African Journal of Business Management, 34(2):a679, doi:10.4102/sajbm.v34i2.679.
dc.descriptionThe original publication is available at https://sajbm.org
dc.description.abstractThe growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management, which leads to an ad hoc approach to information security and resultant information and financial losses. The main objective of the research thus was to determine the current state of information security at a large manufacturing company in South Africa. The methodology entailed a field study of which three sets of structured questionnaires on information security were an important component. Based on a literature study concerning the ideal information security and control situation and the results of the three sets of questionnaires it was possible to determine the gap, problem areas and issues of information security and control at the manufacturing company. The research clearly indicated that numerous areas for improvement exist and therefore proposes a framework for the management of information security. Although a completely secure information system may not be attainable, the valuable information asset can to a large extent be protected through proper management.
dc.description.urihttps://sajbm.org/index.php/sajbm/article/view/679
dc.format.extent11 pages
dc.language.isoen
dc.publisherAOSIS
dc.subjectComputer securityen_ZA
dc.titleThe management of information security : a South African case studyen_ZA
dc.typeArticle
dc.description.versionPublisher's version
dc.rights.holderAuthor retains copyright


Files in this item

Thumbnail

This item appears in the following Collection(s)

ITEM VIEW