Proactive Information Security Strategy for a Secure Business Environment

Proactive Information Security Strategy for a Secure Business Environment

Ionica Oncioiu, Anca Gabriela Petrescu, Diana Andreea Mândricel, Ana Maria Ifrim
Copyright: © 2019 |Pages: 18
ISBN13: 9781522572770|ISBN10: 1522572775|ISBN13 Softcover: 9781522588597|EISBN13: 9781522572787
DOI: 10.4018/978-1-5225-7277-0.ch012
Cite Chapter Cite Chapter

MLA

Oncioiu, Ionica, et al. "Proactive Information Security Strategy for a Secure Business Environment." Managerial Perspectives on Intelligent Big Data Analytics, edited by Zhaohao Sun, IGI Global, 2019, pp. 214-231. https://doi.org/10.4018/978-1-5225-7277-0.ch012

APA

Oncioiu, I., Petrescu, A. G., Mândricel, D. A., & Ifrim, A. M. (2019). Proactive Information Security Strategy for a Secure Business Environment. In Z. Sun (Ed.), Managerial Perspectives on Intelligent Big Data Analytics (pp. 214-231). IGI Global. https://doi.org/10.4018/978-1-5225-7277-0.ch012

Chicago

Oncioiu, Ionica, et al. "Proactive Information Security Strategy for a Secure Business Environment." In Managerial Perspectives on Intelligent Big Data Analytics, edited by Zhaohao Sun, 214-231. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7277-0.ch012

Export Reference

Mendeley
Favorite

Abstract

Taking into consideration the competitive market, the protection of information infrastructure for a company means competitive advantage. The protected information along with risk analysis are the underlying decision making in the company: either development, positioning on new markets, expansion on emerging markets, exit markets, or acquisitions. At the same time, the protection of information together with operational business intelligence systems are the keys for the decisions of CEOs. Implementing appropriate security measures to counter threats such as attacks can be blocked, or its effects can be mitigated. In this context, this chapter intends to be a thorough reflection on the awareness of potential threats and vulnerabilities, as well as a preoccupation towards cooperation in countering them with well-established rules and mechanisms created at a national and organizational level. The results are relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.