INFORMATION SECURITY POLICY OF ORGANIZATION IN RELATION TO MARKETING COMMUNICATION

被引:0
|
作者
Blisak, L'uboslav [1 ]
Salgovicova, Jarmila [1 ]
机构
[1] Univ Ss Cyril & Methodius Trnava, Fac Mass Media Commun, Trnava 91701, Slovakia
关键词
Consumer protection; Credibility; Information security; Ethical approach; Legislation; Threats;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Currently, anybody may face security threats. All entities which keep or process sensitive data are potential targets. Threat of sensitive information leak is a complex issue. In this contribution, we deal with information security policy regarding the protection of customers and individual companies against threats associated with the leakage of sensitive information. We discuss the way-outs and legislative standards, and provide practical examples of dealing with violations to sensitive information, resulting in the damage to clients and the harm of goodwill. The last part of the article submits the proposals on how to reduce the risk of hacking threats to information databases, unauthorized access to sensitive personal data, secrets and patents, which might increase credibility of the organizations via applying moderate communication strategy.
引用
收藏
页码:526 / 539
页数:14
相关论文
共 50 条
  • [1] INFORMATION SECURITY IN INTEGRATED MARKETING COMMUNICATION
    Urdzikova, Jana
    Beno, Pavel
    MARKETING IDENTITY: EXPLOSION OF INNOVATIONS, 2014, : 559 - 573
  • [2] Ethical Concerns of Information Policy and Organization in National Security
    Unsworth, Kristene
    CATALOGING & CLASSIFICATION QUARTERLY, 2009, 47 (07) : 642 - 656
  • [3] CRITICAL CONSIDERATIONS FOR ORGANIZATION-SPECIFIC INFORMATION SECURITY POLICY DEVELOPMENT
    Kinnunen, Hanna
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TRANSFORMATIONS AND INNOVATIONS IN MANAGEMENT (ICTIM 2017), 2017, 37 : 813 - 822
  • [4] From Information Security Awareness to Reasoned Compliant Action: Analyzing Information Security Policy Compliance in a Large Banking Organization
    Bauer, Stefan
    Bernroider, Edward W. N.
    DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2017, 48 (03): : 44 - 68
  • [5] A study of human factors toward compliance with organization's information security policy
    Arif, Muhammad
    Badila, Madalina
    Warden, Julia M.
    Rehman, Altaf Ur
    INFORMATION SECURITY JOURNAL, 2025,
  • [6] Information security policy
    Mead, N
    Anderson, R
    McGraw, G
    Machanick, P
    Bollinger, T
    Shimeall, T
    Pyster, A
    Brown, D
    Draier, E
    Schmidt, H
    IEEE SOFTWARE, 2000, 17 (05) : 26 - 32
  • [7] Marketing chemical information in a research organization
    Saari, DS
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2003, 225 : U557 - U557
  • [8] Embedding information security into the organization
    Johnson, M. Eric
    Goetz, Eric
    IEEE SECURITY & PRIVACY, 2007, 5 (03) : 16 - 24
  • [9] Information Policy: Does Information Policy lead to Information Security?
    Alhussain, Abdullah
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 6520 - 6523