Show Summary Details

Page of

PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).

date: 18 November 2019

Abstract and Keywords

A key aspect of the rights and responsibilities associated with the use, storage, retrieval, and collection of data' is the question of security. The first part of this article considers the growing sophistication of newer technologies that demands new security management thinking beyond addressing individual vulnerabilities. It describes some new complexities resulting from interactions among more feature-rich technologies and their use, along with consideration of related security risks. It goes on to present some ideas for improving security management efforts and includes suggestions for more proactively identifying risks resulting from the emergent use of these systems. The potential role of logical models similar to those used for decades for information systems analysis and design is introduced. This article presents an effort to bridge the gap between high-level policy-based security management and low-level technology-based security management to consider how more attention to technological and business processes may lead to improvements in information security management efforts.

Keywords: security risk, responsibilities, risks, high-level policy, information security management

Access to the complete content on Oxford Handbooks Online requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.

Please subscribe or login to access full text content.

If you have purchased a print title that contains an access token, please see the token for information about how to register your code.

For questions on access or troubleshooting, please check our FAQs, and if you can''t find the answer there, please contact us.