Abstract
As more organizations move to complex distributed information processing environments, IS managers must reexamine their method of controlling the data, software, and applications that run across the systems of the various departments. The increased challenge in protecting the security of data and applications has led to the need for a more efficient management plan.