Jump to ContentJump to Main Navigation
Harboring DataInformation Security, Law, and the Corporation$
Users without a subscription are not able to see the full content.

Andrea M. Matwyshyn

Print publication date: 2009

Print ISBN-13: 9780804760089

Published to Stanford Scholarship Online: June 2013

DOI: 10.11126/stanford/9780804760089.001.0001

Show Summary Details
Page of

PRINTED FROM STANFORD SCHOLARSHIP ONLINE (www.stanford.universitypressscholarship.com). (c) Copyright Stanford University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in SSO for personal use.date: 19 September 2019

Conclusion

Conclusion

Chapter:
(p.228) Conclusion
Source:
Harboring Data
Author(s):

Andrea M. Matwyshyn

Publisher:
Stanford University Press
DOI:10.11126/stanford/9780804760089.003.0012

This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of information security threats; (iii) a need to consider the multiple simultaneous contexts of information risk; and (iv) a need for immediate improvements in corporate self-governance. In the short term, companies must put in place rigorous codes of information security conduct and exercise vigilant enforcement. In the long term, companies must learn to build cultures of information security and develop a sense of collective corporate responsibility for information security, regardless of whether regulation requires them to do so. Meaningful improvements in information security require a commitment to security as an ongoing, collaborative process.

Keywords:   data security, information security, security threats, information risk, corporate self-governance, crporate responsibility

Stanford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.