Privacy through Security: Policy and Practice in a Small-Medium Enterprise

Privacy through Security: Policy and Practice in a Small-Medium Enterprise

Ian Allison (The Robert Gordon University, UK) and Craig Strangwick (ABC Awards Ltd, UK)
DOI: 10.4018/978-1-59904-804-8.ch008
OnDemand PDF Download:
$37.50

Abstract

The chapter discusses how one small business planned for, and implemented, the security of its data in a new enterprise-wide system. The company’s data was perceived as sensitive, and any breach of privacy as commercially critical. From this perspective, the chapter outlines the organizational and technical facets of the policies and practices evidenced. Lessons for other businesses can be drawn from the case by recognizing the need for investments to be made that will address threats in business critical areas. By highlighting the need for organizations to understand the nature of the risk and the probability of an event occurring, the security approaches highlight the need to address both the threats and actions in the event of an incident to reduce the risk to privacy.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Ramesh Subramanian
Acknowledgment
Ramesh Subramanian
Chapter 1
A. Mishra
People all over the world increasingly are concerned about the privacy issues surrounding the personal information collected by private... Sample PDF
Web Privacy: Issues, Legislations, and Technological Challenges
$37.50
Chapter 2
John Thomas
This chapter traces the development in the United States of legal protections of the right to privacy. It begins with the common law “right to be... Sample PDF
Is It Safe to Talk,Yet? The Evolution of Electronic Privacy Law
$37.50
Chapter 3
Sushma Mishra, Amita Goyal Chin
Given the recent monumental events including the September 11th attack on the World Trade Center and the Pentagon as well as the Enron and MCI... Sample PDF
Assessing the Impact of Governmental Regulations on the IT Industry: A Neo Institutional Theory Perspective
$37.50
Chapter 4
Bernd Carsten Stahl
Privacy is one of the central issues in the information society. New technologies pose new threats to privacy but they may also facilitate new ways... Sample PDF
The Impact of the UK Human Rights Act 1998 on Privacy Protection in the Workplace
$37.50
Chapter 5
Madhu V. Ahluwalia, Aryya Gangopadhyay
This chapter gives a synopsis of the techniques that exist in the area of privacy preserving data mining. Privacy preserving data mining is... Sample PDF
Privacy Preserving Data Mining: Taxonomy of Existing Techniques
$37.50
Chapter 6
Yue Liu
The increasing use of biometric technology is often accompanied by grandiose claims about its ability to enhance security and the debate.over the... Sample PDF
Rational Concerns about Biometric Technology: Security and Privacy
$37.50
Chapter 7
Roger Clarke
Many categories of e-business continue to under-achieve. Their full value cannot be unlocked while key parties distrust the technology or other... Sample PDF
Business Cases for Privacy-Enhancing Technologies
$37.50
Chapter 8
Ian Allison, Craig Strangwick
The chapter discusses how one small business planned for, and implemented, the security of its data in a new enterprise-wide system. The company’s... Sample PDF
Privacy through Security: Policy and Practice in a Small-Medium Enterprise
$37.50
Chapter 9
Richard V. McCarthy, Martin Grossman
Enterprise Architecture is a relatively new concept that has been adopted by large organizations for legal, economic, and strategic reasons. It has... Sample PDF
Privacy and Security: where do they fit into the Enterprise Architecture Framework?
$37.50
Chapter 10
Frederick Ip, Yolande E. Chan
This study assists organizations and researchers in examining investments in IS security. A questionnaire was developed and administered to managers... Sample PDF
Information Systems Security: A Survey of Canadian Executives
$37.50
Chapter 11
Sue Conger
With each new technology, new ethical issues emerge that threaten both individual and household privacy. This chapter investigates issues relating... Sample PDF
Emerging Technologies, Emerging Privacy Issues
$37.50
Chapter 12
Anza A. Akram
The purpose of the chapter is to discuss the effects of information and communication technologies on democracy and focuses on the driving forces... Sample PDF
Digital Democracy: Democracy in the Light of Information and Communication Technology
$37.50
Chapter 13
Zheng Yan, Silke Holtmanns
This chapter introduces trust modeling and trust management as a means of managing trust in digital systems. Transforming from a social concept of... Sample PDF
Trust Modeling and Management: From Social Trust to Digital Trust
$37.50
Chapter 14
Dan Manson
This chapter introduces the interrelationships of security, privacy and politics in higher education. University curriculum politics are ingrained... Sample PDF
Security, Privacy, and Politics in Higher Education
$37.50
About the Contributors