Advanced Search
MyIDEAS: Login to save this article or follow this journal

Information Security in Small and Medium-Sized Companies

Contents:

Author Info

  • David Kral

    ()
    (Akademie STING, Brno)

Registered author(s):

    Abstract

    Information security doesn’t involve only large organizations. Small and medium-sized companies must closely examine this issue too, because they are increasingly threatened by cyber attacks. Many of them mistakenly believe, that security of their valuable data is sufficient, or that the attackers are not interested in them. Existing standards and methodologies for implementation and management of information security are often hard to transfer to the environment of small and medium-sized businesses, because these companies do not want, or are not able to observe a large bounty of prescribed procedures and regulations related to certification standards. The article offers a methodology of balanced information security for small and medium-sized businesses. It describes important areas of information security and defines the basic criteria for assessing the security quality of each of the key areas.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://www.vsfs.cz/periodika/acta-2011-01.pdf
    Download Restriction: no

    Bibliographic Info

    Article provided by University of Finance and Administration in its journal ACTA VSFS.

    Volume (Year): 5 (2011)
    Issue (Month): 1 ()
    Pages: 61-73

    as in new window
    Handle: RePEc:prf:journl:v:5:y:2011:i:3:p:61-73

    Contact details of provider:
    Postal: Estonská 500/3, 101 00 Praha 10
    Phone: (+420) 210 088 800
    Fax: (+420) 271 741 597
    Email:
    Web page: http://www.vsfs.cz/
    More information through EDIRC

    Related research

    Keywords: information security; small and medium-sized businesses; risk management; key assets; security of processes; human resources; security incidents.;

    References

    No references listed on IDEAS
    You can help add them by filling out this form.

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:prf:journl:v:5:y:2011:i:3:p:61-73. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Helena Hakenova).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.