Developing a computer security policy for organizational use and implementation

被引:0
|
作者
Forcht, Karen A. [1 ]
Ayers, Walter Cary [1 ]
机构
[1] James Madison University, Harrisonburg, VA 22807, United States
关键词
D O I
暂无
中图分类号
学科分类号
摘要
14
引用
收藏
页码:52 / 57
相关论文
共 50 条
  • [31] Sustainable land use and food security in developing countries: DLV's approach to policy support
    van Keulen, H
    Kuyvenhoven, A
    Ruben, R
    AGRICULTURAL SYSTEMS, 1998, 58 (03) : 285 - 307
  • [32] Obstacles to optimal policy implementation in developing countries
    Morah, EU
    THIRD WORLD PLANNING REVIEW, 1996, 18 (01): : 79 - 106
  • [33] Design and implementation of a campus computer ethics policy
    Covington, MA
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1995, 5 (04): : 31 - &
  • [34] Use of honeynets in computer security education
    Azadegan, S
    McKenna, V
    Fourth Annual ACIS International Conference on Computer and Information Science, Proceedings, 2005, : 320 - 325
  • [35] Identifying Gaps in IT Retail Information Security Policy Implementation Processes Towards developing a secure IT enterprise built on trust
    van Vuuren, Ileen E.
    Kritzinger, Elmarie
    Mueller, Conrad
    2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC), 2015, : 126 - 133
  • [36] TRENDS IN ENGINEERING ORGANIZATIONAL COMPUTER USE.
    Bennett, F.Lawrence
    Journal of Management in Engineering, 1988, 4 (03) : 201 - 216
  • [37] Organizational Security Policy and Management during Covid-19
    Al Shammari, Ayla
    Maiti, Richard Rabin
    Hammer, Bennet
    SOUTHEASTCON 2021, 2021, : 528 - 531
  • [38] Enemies within: Redefining the insider threat in organizational security policy
    Wall, David S.
    SECURITY JOURNAL, 2013, 26 (02) : 107 - 124
  • [39] Information security policy: An organizational-level process model
    Knapp, Kenneth J.
    Morris, R. Franklin, Jr.
    Marshall, Thomas E.
    Byrd, Terry Anthony
    COMPUTERS & SECURITY, 2009, 28 (07) : 493 - 508
  • [40] Enemies within: Redefining the insider threat in organizational security policy
    David S Wall
    Security Journal, 2013, 26 : 107 - 124