@inproceedings{f7209ecc01204b289be1f4013e0b83da,
title = "Weak signals in information security management",
abstract = "Usually, information security management practices do not explicitly take account of weak signals, factors that lie below the detection surface, which may, however, constitute a huge security threat. This study analyses what kinds of weak signals are present in information security, followed by a discussion on their detection. Responses to weak signals are also considered as well as certain privacy concerns related to the issue. These issues are of great urgency not only for government officials responsible of public security and dealing with the current wave of terrorism, but also to corporate information security and top managers running the day to day business of their companies.",
keywords = "information security",
author = "Jorma Kajava and Reijo Savola and Rauno Varonen",
year = "2005",
doi = "10.1007/11596981_75",
language = "English",
isbn = "978-3-540-30819-5",
volume = "Part II",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "508--517",
editor = "Yue Hao and Jiming Liu and Yu-Ping Wang and Yiu-ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong-Chang Jiao",
booktitle = "Computational Intelligence and Security CIS 2005",
address = "Germany",
note = "International Conference on Computational Intelligence and Security, CIS 2005 ; Conference date: 15-12-2005 Through 19-12-2005",
}