Developing a computer security policy for organizational use and implementation

被引:0
|
作者
Forcht, Karen A. [1 ]
Ayers, Walter Cary [1 ]
机构
[1] James Madison University, Harrisonburg, VA 22807, United States
关键词
D O I
暂无
中图分类号
学科分类号
摘要
14
引用
收藏
页码:52 / 57
相关论文
共 50 条
  • [21] Implementation of computer security at nuclear facilities in Germany
    Lochthofen, Andre
    Sommer, Dagmar
    PROGRESS IN NUCLEAR ENERGY, 2015, 84 : 103 - 107
  • [22] ORGANIZATIONAL FORM AND OR-MS IMPLEMENTATION IN A DEVELOPING REGION
    BARTH, RT
    VERTINSK.I
    MANAGEMENT INTERNATIONAL REVIEW, 1973, 13 (2-3) : 121 - 133
  • [23] Automatic security policy enforcement in computer systems
    Adi, Kamel
    Hamza, Lamia
    Pene, Liviu
    COMPUTERS & SECURITY, 2018, 73 : 156 - 171
  • [24] Swarming computer security: An experiment in policy distribution
    Menezes, R
    Ford, R
    Ondi, A
    2005 IEEE SWARM INTELLIGENCE SYMPOSIUM, 2005, : 436 - 439
  • [25] Advanced Security Policy Implementation for Information Systems
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 244 - 247
  • [26] Unified Language for Network Security Policy Implementation
    Chernyavskiy, Dmitry
    Miloslavskaya, Natalia
    PROCEEDINGS OF ICNS 2011: THE SEVENTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2011, : 136 - 140
  • [27] A security policy implementation model in Computational GRID
    Li, F
    Luo, JZ
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 1021 - 1025
  • [28] European Security and Defence Policy: An implementation perspective
    Gebhard, Carmen
    JCMS-JOURNAL OF COMMON MARKET STUDIES, 2008, 46 (04) : 900 - 900
  • [29] Working Towards Policy: A Theory of Organizational Implementation and Management
    Patty, John W.
    JOURNAL OF PUBLIC ADMINISTRATION RESEARCH AND THEORY, 2024, 34 (01) : 53 - 66
  • [30] Human and organizational factors in computer and information security: Pathways to vulnerabilities
    Kraemer, Sara
    Carayon, Pascale
    Clem, John
    COMPUTERS & SECURITY, 2009, 28 (07) : 509 - 520