Abstract
Along with the increased need for information systems comes the need to protect the data in these systems. MIS managers face the challenge of finding the best measures of system security. This article provides a structural methodology for building controls into the system during systems design.