Abstract
The traditional concept of work has changed towards working anywhere at any time with portable networking devices using electronic collaboration and many other tools. New risks introduced by this new working style should be assessed and counterbalanced by data management procedures. But management procedures are rarely found and applied in academia. Especially European universities are proud of open exchange culture and are neither prepared nor aware for protecting their intellectual asset: this situation has the potential to weaken competitiveness and – as a consequence – our future economy
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literature
Application Security, Inc.An Examination of Database BreachesatHigherEducation Institutions, 2010
BeliefNetworks:Semantically Secure Unstructured Data Classification, Charleston South Carolina, 2009.
Media Statement: Chaminade University, Honolulu 2009. (http://www.chaminade.edu/infosecure/retrievedJuly 14th 2012)
Davies,John L: The dialogue of universities with their stakeholders:comparisons between different regions of Europe, 1998.
Day,Glen: Strategic Information Management Through Data Classification, 2010.
The Department of Trade and Industry (DTI) in the U.S: Defining Data Loss, 2010.
Filkins,Barbara &Radcliff,Deb: Data Leakage Landscape: Where Data Leaks and How Next Generation Tools Apply, 2008.
Financial Services Authority (FSA): Data Security in Financial Services. Firm’s Controls to Prevent Data Loss by their Employees and Third-Party Suppliers, 2008.
Identity Finder (IF): Data Loss Prevention: Data-at-Rest vs. Data-in-Motion,2011.
IRONPORT SYST EMS (IROS): Data Loss Prevention Best Practices, 2010.
ISACA: RISK IT PRACTITIONER GUIDE, 2011, P.20.
Joint Universities Computer Centre Limited (JUCC): Information Security and challenges, 2009.
Kanagasingham,Prathaben: Data Leakage Prevention a newsletter for IT professionals, 2008.
Lacey,David: Managing the Human Factor in Information Security, 2009.
PALISADE SYSTEMS (PALS): Why DLP? A Report on Data Loss Prevention. 2011.
Raman Preeti, KayacıkHilmiGünes, Somayaji Anil: Understanding Data Leak Prevention, 2009
Watson, Hall Ltd: Information security due diligence, 2009.
ZilbermanPolina, ShabtaiAsaf, RokachLior:Analyzing Group Communication for Preventing Data Leakage via Email, 2008.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Noghondar, E., Marfurt, K., Haemmerli, B. (2012). The Human Aspect in Data Leakage Prevention in Academia. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_14
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)