Return to Article Details Computer planning and its influence on information security