Defining information security education, training, and awareness needs using electronic meeting space

被引:0
作者
Schou, CD [1 ]
Frost, J [1 ]
Wingert, N [1 ]
Maconachy, WV [1 ]
机构
[1] Idaho State Univ, Coll Business, Pocatello, ID 83205 USA
来源
SENSORS, C31, INFORMATION, AND TRAINING TECHNOLOGIES FOR LAW ENFORCEMENT | 1999年 / 3577卷
关键词
information security; privacy; standards; NIST; NSA; electronic commerce; NII; groups; DACUM; GDSS;
D O I
10.1117/12.336983
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The United States is at target. For those of us who grew up during the cold war this is no news; however, the threat is different than it has been in the past. Now it may be another super power or it may be a teenage child with a personal computer. Both government and civilian entities are potential targets. The National Information Infrastructure (NII) is the real target. The determined hacker can bring down not only government systems but the power-grid, the financial system, or the air traffic control system as well. All organizations must be aware of the threat and be prepared to react appropriately. Of course, the federal government has begun to protect their critical systems; however, many American corporations have not yet fully protected their systems. Since there is a common threat, common standards for countermeasures are applicable. The paper reports on the use of an electronic meeting room technology by government, industry, and academia to establish a national training standard. If you are a CIO, or advise one about security matters, these standards are important.
引用
收藏
页码:356 / 367
页数:12
相关论文
共 51 条
[1]  
AKERLOF GA, 1991, AM ECON REV, V81, P1
[2]  
ANDREW CG, 1984, APICS 27 ANN C P, P133
[3]  
[Anonymous], PRODUCTION INVENTORY
[4]  
[Anonymous], 1917, DRAWING DESIGN
[5]  
[Anonymous], 1993, POSTCAPITALIST SOC
[6]   THE BASE-RATE FALLACY - CONTRASTING PROCESSES AND OUTCOMES OF GROUP AND INDIVIDUAL JUDGMENT [J].
ARGOTE, L ;
DEVADAS, R ;
MELONE, N .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1990, 46 (02) :296-310
[7]  
AYTES KSD, 1994, P IASTED QUAL PROD S
[8]  
BARLOW JF, 1991, J SYST MANAGE, V42, P13
[9]   EFFECTS OF ANONYMITY AND EVALUATIVE TONE ON IDEA GENERATION IN COMPUTER-MEDIATED GROUPS [J].
CONNOLLY, T ;
JESSUP, LM ;
VALACICH, JS .
MANAGEMENT SCIENCE, 1990, 36 (06) :689-703
[10]   GROUP DECISION, CHOICE SHIFT, AND POLARIZATION IN CONSULTING, POLITICAL, AND LOCAL POLITICAL SCENARIOS - AN EXPERIMENTAL INVESTIGATION AND THEORETICAL-ANALYSIS [J].
CROTT, HW ;
SZILVAS, K ;
ZUBER, JA .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 49 (01) :22-41