Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is CIA

Global Business Leadership Development for the Fourth Industrial Revolution
Stands for ‘confidentiality’, ‘integrity’, and ‘availability’, and describes the desired attributes for data to trustworthy, accurate, and accessible to only those who have permission to use it.
Published in Chapter:
Data Privacy vs. Data Security
Sue Milton (SSM Governance Associates, UK)
DOI: 10.4018/978-1-7998-4861-5.ch009
Abstract
The proliferation of data exposure via social media implies privacy and security are a lost cause. Regulation counters this through personal data usage compliance. Organizations must also keep non-personal data safe from competitors, criminals, and nation states. The chapter introduces leaders to the two data governance fundamentals: data privacy and data security. The chapter argues that data security cannot be achieved until data privacy issues have been addressed. Simply put, data privacy is fundamental to any data usage policy and data security to the data access policy. The fundamentals are then discussed more broadly, covering data and information management, cyber security, governance, and innovations in IT service provisioning. The chapter clarifies the complementary fundamentals and how they reduce data abuse. The link between privacy and security also demystifies the high resource costs in implementing and maintaining security practices and explains why leaders must provide strong IT leadership to ensure IT investment is defined and implemented wisely.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
An Analysis of Industry 4.0
The triad of confidentiality, integrity, and availability are the underpinning factors in considering mitigating control-sets to treat cyber security problem areas.
Full Text Chapter Download: US $37.50 Add to Cart
Prediction, Detection, and Mitigation of DDoS Attacks Using HPCs: Design for a Safer Adaptive Infrastructure
Representation of the main attributes that assist in the implementation of information security for those who want to protect.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Innovations in Teaching-Learning and Evaluation: An Overview of Processes Undertaken at CHRIST (Deemed to be University)
Continuous internal assessments helps assess the students learning throughout the course. It is done systematically through an internal mechanism, or in other words called as internals.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR