A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study

نویسندگان

  • Michael Lapke
  • Gurpreet Dhillon
چکیده

This study is aimed at understanding how multiple perspectives of stakeholders are incorporated in the formulation of security policy. The research was guided by the Theory of Semantics. A framework was created from established semantic theory. Guided by the framework, a case study was carried out at a large state University. The point of the case study was to provide insight into security policy formulation. This insight may guide researchers in developing principles for effective security policy design. The development and implementation of this framework of semantic analysis is the major contribution of this paper. This framework could also help future researchers pursue semantic research.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Value Engineering for strategy formulation (Case study: Fisheries sector)

  This paper analyzes the results of implementing Value Engineering (VE) into SWOT methodology undertaken in Yazd province of Iran. This is the first time that these techniques have been undertaken for fisheries sector in Iran. The study mainly aims at applying Value Engineering and SWOT techniques to achieve the best out of decision-making, and also of management issues as a whole, through the...

متن کامل

Implementation of Value Engineering for strategy formulation (Case study: Fisheries sector)

  This paper analyzes the results of implementing Value Engineering (VE) into SWOT methodology undertaken in Yazd province of Iran. This is the first time that these techniques have been undertaken for fisheries sector in Iran. The study mainly aims at applying Value Engineering and SWOT techniques to achieve the best out of decision-making, and also of management issues as a whole, through the...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Gender Analysis of Social Security Policies in Post- Revolutionary Iran

Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the  gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...

متن کامل

Gender Analysis of Social Security Policies in Post- Revolutionary Iran

Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the  gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006