Author List: Loch, Karen D.; Carr, Houston H.; Warkentin, Merrill E.;
MIS Quarterly, 1992, Volume 16, Issue 2, Page 173-186.
In formation systems security remains high on the list of key issues facing information systems executives. Traditional concerns range from forced entry into computer and storage rooms to destruction by fire, earthquake, flood, and hurricane. Recent attention focuses on protecting information systems and data from accidental or intentional unauthorized access, disclosure, modification, or destruction. The consequences of these events can range from degraded or disrupted service to customers to corporate failure. This article reports on a study investigating MIS executives' concern about a variety of threats. A relatively new threat, computer viruses, was found to be a particular concern. The results highlight a gap between the use of modern technology and the understanding of the security implications inherent in its use. Many of responding information systems managers have migrated their organizations into the highly interconnected environment of modern technology but continue to view threats from a perspective of a pre-connectivity era. They expose theft firms to unfamiliar risks of which they are unaware, refuse to acknowledge, or are often poorly equipped to manage.
Keywords: computer laws; computer security; computer viruses; information resources management; information systems security; Threats
Algorithm:

List of Topics

#150 0.242 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational managing interviews study results concerns
#56 0.166 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals protection insiders attackers precautions vice
#63 0.122 mis problems article systems management edp managers organizations ;br> data survey application examines need experiences recent organization reports departments oriented
#80 0.088 organizations new information technology develop environment challenges core competencies management environmental technologies development emerging opportunities levels based change business technical
#194 0.086 use habit input automatic features modification different cognition rules account continuing underlying genre emotion way light triggers conscious triggered habitual
#35 0.076 technology organizational information organizations organization new work perspective innovation processes used technological understanding technologies transformation consequences perspectives use administrative economic
#186 0.064 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection