Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Information Resource Management:The Organisations' Need for a Secure Approach


Affiliations
1 Tata Consultancy Services, Plot C, Block EP, Salt Lake Electronics Complex Kolkata 700091, West Bengal, India
     

   Subscribe/Renew Journal


Organizations need to maintain their digital knowledge base in a controlled environment with provisions for conditional access. Along with its trademark efficiency of use, digital information resource management brings potential security concerns which need to be systematically apprehended and addressed. Creation and implementation of information security policies are essential to combat these vulnerabilities.

Keywords

Information Security, Information Resource Management (IRM), Isecurity, Security Policies.
User
About The Author

Amitava Bhattacharyya
Tata Consultancy Services, Plot C, Block EP, Salt Lake Electronics Complex Kolkata 700091, West Bengal
India


Notifications

  • Information Resources Management; Knowledge Connections:
  • NIST (National Institute of Standards and technology), Computer Security Division:
  • The Information Technology Professional's Resource Center:
  • Information Security: A new approach, Network magazine:
  • INFOSYSSEC (The Security Portal for Information System Security Professionals):
  • 12 Recommendations For Your 2009 Information Security Strategy Forrester Research, February 17, 2009:

Abstract Views: 305

PDF Views: 14




  • Information Resource Management:The Organisations' Need for a Secure Approach

Abstract Views: 305  |  PDF Views: 14

Authors

Amitava Bhattacharyya
Tata Consultancy Services, Plot C, Block EP, Salt Lake Electronics Complex Kolkata 700091, West Bengal, India

Abstract


Organizations need to maintain their digital knowledge base in a controlled environment with provisions for conditional access. Along with its trademark efficiency of use, digital information resource management brings potential security concerns which need to be systematically apprehended and addressed. Creation and implementation of information security policies are essential to combat these vulnerabilities.

Keywords


Information Security, Information Resource Management (IRM), Isecurity, Security Policies.

References