Research Article

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Table 2

Permissions for IM software.

Control groupRolesCommunication monitoring technology

IM communication managementOperations staffSales staffRecord instant messaging content/block file transfers
Human resource staffTrade staff
Administrative staffSystem development staff
General staffText staff
Legal staffResearch staff
Marketing staffFinancial staff
Project management staffā€‰