Validity of information security policy models
نویسندگان
چکیده
منابع مشابه
Information Security Policy Compliance: The Role of Information Security Awareness
Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Th...
متن کاملInformation Security Policy - What do International Information Security Standards say?
One of the most information security controls is the information security policy. This vital direction-giving document is, however, not always easy to develop and the authors thereof battle with questions such as what constitutes a policy. This results in the policy authors turning to existing sources for guidance. One of these sources is the various international information security standards...
متن کاملInformation Availability and Security Policy
Information availability is a key element of information security. However, information availability has not been addressed with the same enthusiasm as confidentiality and integrity because availability is impacted by many variables which cannot easily be controlled. The principal goal of this research is to characterize information availability in detail and investigate how effective enterpris...
متن کاملAssessing The Policy Dimension Of Information Security
Information is the most important asset that must be secured in any organization. The integrity, availability and confidentiality of information will enable an organization to maintain competitive advantage in the marketplace. Information Security is a multi-dimensional discipline. The following dimensions of Information Security can be considered to obtain a holistic overview of the security o...
متن کاملInformation Security Policy: A Management Practice Perspective
Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices. This paper provides a comprehensive overview of the management practices of information security polic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transinformação
سال: 2004
ISSN: 0103-3786
DOI: 10.1590/s0103-37862004000300006