skip navigation
National Criminal Justice Reference Service
Login | Subscribe/Register | Manage Account | Shopping Cartshopping cart icon | Help | Contact Us | Home     
National Criminal Justice Reference Service
  Advanced Search
Search Help
     
| | | | |
place holder
Administered by the Office of Justice Programs U.S. Department of Justice Office of Justice Programs Seal National Criminal Justice Reference Service National Criminal Justice Reference Service Office of Justice Programs Seal National Criminal Justice Reference Service
Topics
A-Z Topics
Corrections
Courts
Crime
Crime Prevention
Drugs
Justice System
Juvenile Justice
Law Enforcement
Victims
Left Nav Bottom Line
Home / NCJRS Abstract

Publications
 

NCJRS Abstract


The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
 
NCJ Number: NCJ 100111  
Title: Computer Crime and Business Information - A Practical Guide for Managers
Author(s): J A Schweitzer
Sale: Elsevier Science
Box 945
New York, NY 10159-0945
United States
Publication Date: 1986
Pages: 199
Origin: United States
Language: English
Annotation: Viewing computer security as a subset within the issue of information resource management (IRM), this book focuses on identifying valuable business information; its organization and control; and establishing policies, standards, and procedures to manage such information in a secure, cost-effective manner.
Abstract: Part 1 surveys the vulnerabilities of electronic information, security implications of personal computers, and the direct relationship between the value of business information and the use of properly designed computing. Part 2 outlines the IRM system, with attention to the design and technology of information systems, assessing the value of business information, a written policy and written standards governing information security, and controls over information processing activities. Part 3 discusses the benefits of the IRM approach over risk assessment, as are computerized access control systems, protection for personal workstations and communications, and the place of informational security in the organizational structure. Additional topics covered include contingency planning for alternative information systems and suggestions on beginning an IRM program. Case studies are used throughout the text. Appendixes provide checklists, examples of IRM policies and other directives, and a computer crime legislation proposal. A glossary, 32 references, and an index are supplied.
Main Term(s): Computer crime prevention measures
Index Term(s): Data security ; Computer related crime ; Business security
 
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/Publications/abstract.aspx?ID=100111

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.


Contact Us | Feedback | Site Map
Freedom of Information Act | Privacy Statement | Legal Policies and Disclaimers | USA.gov

U.S. Department of Justice | Office of Justice Programs | Office of National Drug Control Policy

place holder