Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Five dimensions of information security awareness
 ACM SIGCAS Computers and Society31 (2):24-29,2001.Type:Article
Date Reviewed: May 22 2002

Although awareness of the importance of information has been growing rapidly for decades, many organizations still lack an appreciation of the different ways in which people can look at and measure the importance of information security.

The author identifies five views, or “dimensions,” of information security awareness. In the organizational dimension, members of the organization must appreciate the value of information to the organization, and the value of protecting it from destruction or inappropriate disclosure. In the general public dimension, while IT professionals may appreciate the concerns associated with information security, lay users of information may not appreciate the importance of protecting private data and passwords, and of having safeguards against malicious software.

While privacy is also an important concern in the sociopolitical dimension, so too are formal (legal), and informal (ethical), strictures on the use of information. Ethical concerns extend to the ethical dimension, where sharing data is vital to the harmonious functioning of society. Finally, the educational dimension involves the provision of information on how people should use and protect data.

It would be easy to dismiss the author’s points as obvious, but that would be wrong. Effective management of information requires an appreciation of all the reasons for information security, and the author provides a useful, well-written, cogent, and apt framework for organizing the efforts of both managers and IT professionals.

Reviewer:  S. A. Kurzban Review #: CR126072 (0205-0293)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Ethics (K.4.1 ... )
 
 
Public Policy Issues (K.4.1 )
 
 
Social Issues (K.4.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy