Jump to ContentJump to Main Navigation
Harboring DataInformation Security, Law, and the Corporation$
Users without a subscription are not able to see the full content.

Andrea M. Matwyshyn

Print publication date: 2009

Print ISBN-13: 9780804760089

Published to Stanford Scholarship Online: June 2013

DOI: 10.11126/stanford/9780804760089.001.0001

Show Summary Details
Page of

PRINTED FROM STANFORD SCHOLARSHIP ONLINE (www.stanford.universitypressscholarship.com). (c) Copyright Stanford University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in SSO for personal use.date: 24 October 2019

Introduction

Introduction

Chapter:
(p.3) Introduction
Source:
Harboring Data
Author(s):

Andrea M. Matwyshyn

Publisher:
Stanford University Press
DOI:10.11126/stanford/9780804760089.003.0001

This introductory chapter briefly sets out the book's purpose, which is to explore some of the dynamics behind corporations' struggle with information security. It then discusses the reasons behind the continuing escalation in data vulnerability, which include dynamics on three levels: the macro or societal level; the meso or group level; and the micro or individual level. On the macro level, corporate hoarding of networked, aggregated consumer data, the expansion of information criminality, and the arrival of information security regulation have all affected the ecology of corporate information security. On the mesosystem/interpersonal level, information vulnerability erodes commercial trust and imposes costs on third parties. On the micro level, individual companies often ignore information security or believe the return on investment in information security to be inadequate. These suboptimal approaches result from, first, a failure to recognize the losses caused by weak information security, and second, an absence of thorough risk management planning. An overview of the subsequent chapters also presented.

Keywords:   information security, consumer data, information criminality, information security regulation, data vulnerability

Stanford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.