{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T03:49:43Z","timestamp":1777434583012,"version":"3.51.4"},"reference-count":3,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998,10,1]]},"abstract":"<jats:p>Information security has become very important in most organizations. The main reason for this is that access to information and the associated resources has become easier because of the developments in distributed processing, for example the Internet and electronic commerce. The result is that organizations need to ensure that their information is properly protected and that they maintain a high level of information security. In many cases, organizations demand some proof of adequate information security from business partners before electronic commerce can commence. In this paper, one of the building blocks for a secure IT infrastructure is discussed, namely trusted computer products and systems. A high level explanation of the TCSEC and ITSEC standards forms the latter part of the paper.<\/jats:p>","DOI":"10.1108\/eum0000000004533","type":"journal-article","created":{"date-parts":[[2004,5,11]],"date-time":"2004-05-11T21:50:49Z","timestamp":1084312249000},"page":"174-177","source":"Crossref","is-referenced-by-count":11,"title":["Information security management (1): why information security is so important"],"prefix":"10.1108","volume":"6","author":[{"given":"Rossouw","family":"von Solms","sequence":"first","affiliation":[{"name":"Port Elizabeth Technikon, Port Elizabeth, South Africa"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"2025072819525462100_b1","unstructured":"Department of Defense (DoD)\n           (1985), Department of Defence Trusted Computer System Evaluation Criteria (TCSEC), Washington DC.."},{"key":"2025072819525462100_b2","unstructured":"European Computer Manufacturers Association (ECMA)\n           (1995), Secure Information Processing versus the Concept of Product Evaluation, TR\/64, December."},{"key":"2025072819525462100_b3","unstructured":"Information Technology Security Evaluation Criteria (ITSEC)\n           (1990), Harmonised Criteria of France, Germany, The Netherlands and the UK."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EUM0000000004533\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/174\/1246829\/eum0000000004533.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ics\/article-pdf\/6\/4\/174\/1246829\/eum0000000004533.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T23:52:58Z","timestamp":1753746778000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ics\/article\/6\/4\/174\/182337\/Information-security-management-1-why-information"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10,1]]},"references-count":3,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1998,10,1]]}},"URL":"https:\/\/doi.org\/10.1108\/eum0000000004533","relation":{},"ISSN":["0968-5227","1758-5805"],"issn-type":[{"value":"0968-5227","type":"print"},{"value":"1758-5805","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,10,1]]}}}