It is commonplace to say that the 11 September attacks have changed everything. A global revolution is changing business, and business is changing the world. With unsettling speed, two forces are converging; a new generation of business leaders is rewriting the rules of business, and a new breed of fast companies is challenging the corporate status quo. The Internet is an information superhighway, touching almost every aspect of the economy from government agencies, financial institutions, businesses, and professional organizations. With the year 2002 and its increasing number of court cases on Internet‐related issues, the courts are obviously still struggling with the question of intellectual property rights in an open source code environment supporting e‐commerce. By modeling and classifying the risks associated with cybersecurity issues, firms and specific individuals should not become a casualty of this cyberwar, nor become paranoid about the risks ‐‐ be informed and follow common business sense practices, policies, and procedures.
Article navigation
1 October 2002
This article was originally published in
Information Management & Computer Security
Literature Review|
October 01 2002
Issues in cybersecurity; understanding the potential risks associated with hackers/crackers Available to Purchase
Alan D. Smith;
Alan D. Smith
Department of Management and Marketing, Robert Morris University, Pittsburgh, Pennsylvania, USA
Search for other works by this author on:
William T. Rupp
William T. Rupp
Department of Management and Marketing, Robert Morris University, Pittsburgh, Pennsylvania, USA
Search for other works by this author on:
Publisher: Emerald Publishing
Online ISSN: 1758-5805
Print ISSN: 0968-5227
© MCB UP Limited
2002
Information Management & Computer Security (2002) 10 (4): 178–183.
Citation
Smith AD, Rupp WT (2002), "Issues in cybersecurity; understanding the potential risks associated with hackers/crackers". Information Management & Computer Security, Vol. 10 No. 4 pp. 178–183, doi: https://doi.org/10.1108/09685220210436976
Download citation file:
2,912
Views
Suggested Reading
A framework for analyzing e‐commerce security
Information Management & Computer Security (October,2002)
Domain names management: a strategy for electronic commerce security
Information Management & Computer Security (December,2001)
Promoting security awareness and commitment
Information Management & Computer Security (May,1995)
Security and trust management in supply chains
Information Management & Computer Security (December,2001)
An investigation of students' perception of Bluetooth security
Information Management & Computer Security (November,2012)
Related Chapters
How Information Technology Transforms the Methods of Sociological Research: Past and Future
Networks, Hacking, and Media – CITA MS@30: Now and Then and Tomorrow
E-knowledge of Indian Rural Consumers: A Field Survey Result Based on Durable Goods
Comparative Advantage in the Knowledge Economy: A National and Organizational Resource
Simulation and computerised models for pedestrian facilities
Pedestrian Facilities: Geometric design for safety and mobility
Recommended for you
These recommendations are informed by your reading behaviors and indicated interests.
