Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Information security strategies: towards an organizational multi-strategy perspective
Ahmad A., Maynard S., Park S. Journal of Intelligent Manufacturing25 (2):357-370,2014.Type:Article
Date Reviewed: Jul 16 2015

This academic paper, originally published in 2012, classifies organizational security strategies into nine basic approaches; provides a summary of prior work; and describes a study involving two focus groups in Korea. The authors are three intellectuals from the University of Melbourne, Australia.

Many papers, covering a time period from 1978 to 2011, were surveyed in preparation. The classification and summary is well done--a useful contribution to the body of knowledge on the subject. The discussion of the prior work highlights the practical advantages and limitations of the various strategies. This alone makes it a worthwhile read.

The focus group study had few participants from a fairly narrow range of backgrounds. There are some interesting conclusions from this study, although the method has limitations that are admitted in the paper.

In summary, this paper is recommended reading for security professionals and information technology (IT) managers with the ability to influence the security strategies of their organizations.

Reviewer:  Neil D. Burgess Review #: CR143617 (1510-0916)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy