The myth of secure computing.

Harv Bus Rev

Harvard Business School, Boston, Massachusetts, USA.

Published: June 2003

Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

Download full-text PDF

Source

Publication Analysis

Top Keywords

senior executives
8
computer security
8
security
5
myth secure
4
secure computing
4
computing senior
4
executives pay
4
pay lot
4
lot attention
4
attention computer
4

Similar Publications

Patient and public involvement and engagement to improve impact on antimicrobial resistance.

Nat Commun

January 2025

Fleming Initiative, Institute for Global Health Innovation, Imperial College London, South Kensington Campus, London, UK.

A step change is required in citizen awareness of the global antimicrobial resistance (AMR) health crisis. But we must move beyond awareness-raising to action, directly engaging and involving patients and public in scoping, testing and scaling solutions to ensure their adoption and impact.

View Article and Find Full Text PDF

Background: A mobile cognition scale for community screening in cognitive impairment with rigorous validation is in paucity. We aimed to develop a digital scale that overcame low education for community screening for mild cognitive impairment (MCI) due to Alzheimer's disease (AD) and AD.

Methods: A mobile cognitive self-assessment scale (CogSAS) was designed through the Delphi process, which is feasible for the older population with low education.

View Article and Find Full Text PDF

Mandarin orange peel (MOP) is recognized for its traditional medicinal properties due to its high flavonoid content. This study aimed to analyze MOP harvested in Japan for specific bioactive compounds and to explore its health applications in dogs, including effects on gut microbiota and cognitive symptoms. Flavonoid content (particularly hesperidin and nobiletin) of MOP was measured.

View Article and Find Full Text PDF

Targeting GSDMD JX06 inhibits PANoptosis and multiple organ injury.

Biochem Pharmacol

January 2025

Shanghai Frontiers Science Center of Drug Target Identification and Delivery, School of Pharmaceutical Sciences, Shanghai Jiao Tong University, Shanghai 200240 PR China; National Key Laboratory of Innovative Immunotherapy, Shanghai Jiao Tong University, Shanghai 200240 PR China. Electronic address:

Multiple organ dysfunction syndrome (MODS) is the major cause of mortality of patients in intensive care units. The elusive mechanisms of tissue damage in MODS and limited therapeutic options encourage us to seek effective therapies to MODS. PANoptosis has recently been proven to be the key player in both heat stress and sepsis-mediated MODS.

View Article and Find Full Text PDF

Principles for embedding learning and adaptation into New Zealand health system functioning: the example of the Viable System Model.

N Z Med J

January 2025

Executive Dean, Bond Business School, Bond University, Gold Coast, QLD, Australia; Harkness Senior Fellow, Commonwealth Fund of New York.

This article makes the case for taking a model-based management approach, specifically using the Viable System Model (VSM), to embed learning and adaptation into the New Zealand health system so it can function as a learning health system. We draw on a case study of a specialist clinical service where the VSM was used to guide semi-structured interviews and workshops with clinicians and managers and to guide analysis of the findings. The VSM analysis revealed a lack of clarity of organisational functioning, and of the systems, processes and integrated IT infrastructure necessary to support the fundamental requirements of a learning health system.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!