dc.contributor.author | Goodyear, Marilu | |
dc.contributor.author | Goerdel, Holly T. | |
dc.contributor.author | Portillo, Shannon | |
dc.contributor.author | Williams, Linda M. | |
dc.date.accessioned | 2011-04-01T17:30:43Z | |
dc.date.available | 2011-04-01T17:30:43Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Goodyear, Marilu, Holly T. Goerdel, Shannon Portillo, and Linda Williams. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers. IBM Center for the Business of Government, 2010. | |
dc.identifier.uri | http://hdl.handle.net/1808/7285 | |
dc.description | Publisher final version | |
dc.description.abstract | The importance of safeguarding information created and shared on computers and the Internet has increased significantly in recent years, as society has become increasingly dependent on information technology in government, business, and in their personal lives. Both corporations and government have responded by creating a new role in their organizations to lead the safeguarding efforts—chief information security officers (CISOs). The role of these officers is still under development. Do they safeguard best by using law enforcement techniques and technological tools? Or are they more effective if they serve as educators and try to influence the behaviors of technology users? | |
dc.description.sponsorship | IBM Center for the Business of Government | |
dc.language.iso | en_US | |
dc.publisher | IBM Center for the Business of Government | |
dc.relation.isversionof | http://www.businessofgovernment.org/article/cybersecurity-management-states-emerging-role-chief-information-security-officers | |
dc.subject | IT Security | en_US |
dc.subject | Chief Information Security Officers | en_US |
dc.title | Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers | |
dc.type | Technical Report | |
kusw.oastatus | na | |
kusw.oapolicy | This item does not meet KU Open Access policy criteria. | |
dc.rights.accessrights | openAccess | |