IS

Loch, Karen D.

Topic Weight Topic Terms
0.242 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.166 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.122 mis problems article systems management edp managers organizations ;br> data survey application examines need experiences

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Carr, Houston H. 1 Warkentin, Merrill E. 1
computer laws 1 computer security 1 computer viruses 1 information resources management 1
information systems security 1 Threats 1

Articles (1)

Threats to Information Systems: Today's Reality, Yesterday's Understanding. (MIS Quarterly, 1992)
Authors: Abstract:
    In formation systems security remains high on the list of key issues facing information systems executives. Traditional concerns range from forced entry into computer and storage rooms to destruction by fire, earthquake, flood, and hurricane. Recent attention focuses on protecting information systems and data from accidental or intentional unauthorized access, disclosure, modification, or destruction. The consequences of these events can range from degraded or disrupted service to customers to corporate failure. This article reports on a study investigating MIS executives' concern about a variety of threats. A relatively new threat, computer viruses, was found to be a particular concern. The results highlight a gap between the use of modern technology and the understanding of the security implications inherent in its use. Many of responding information systems managers have migrated their organizations into the highly interconnected environment of modern technology but continue to view threats from a perspective of a pre-connectivity era. They expose theft firms to unfamiliar risks of which they are unaware, refuse to acknowledge, or are often poorly equipped to manage.