The management of information security: A South African case study

South African Journal of Business Management

 
 
Field Value
 
Title The management of information security: A South African case study
 
Creator Fourie, L. C.H.
 
Subject — —
Description The growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management, which leads to an ad hoc approach to information security and resultant information and financial losses.The main objective of the research thus was to determine the current state of information security at a large manufacturing company in South Africa. The methodology entailed a field study of which three sets of structured questionnaires on information security were an important component. Based on a literature study concerning the ideal information security and control situation and the results of the three sets of questionnaires it was possible to determine the gap, problem areas and issues of information security and control at the manufacturing company. The research clearly indicated that numerous areas for improvement exist and therefore proposes a framework for the management of information security. Although a completely secure information system may not be attainable, the valuable information asset can to a large extent be protected through proper management.
 
Publisher AOSIS
 
Contributor
Date 2003-06-30
 
Type info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion —
Format application/pdf
Identifier 10.4102/sajbm.v34i2.679
 
Source South African Journal of Business Management; Vol 34, No 2 (2003); 19-29 2078-5976 2078-5585
 
Language eng
 
Relation
The following web links (URLs) may trigger a file download or direct you to an alternative webpage to gain access to a publication file format of the published article:

https://sajbm.org/index.php/sajbm/article/view/679/611
 
Coverage — — —
Rights Copyright (c) 2018 L. C.H. Fourie https://creativecommons.org/licenses/by/4.0
ADVERTISEMENT