INFORMATION SECURITY POLICY CREATING

被引:0
|
作者
Koziel, Grzegorz [1 ]
机构
[1] Lublin Univ Technol, Fac Elect Engn & Comp Sci, Inst Comp Sci, Lublin, Poland
来源
关键词
security; information protection;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Ensuring information protection in large organizations demands a special plan. This plan is called information security policy. Inside this document all important things concerning information security should be written. This document should be given to all people having access to information. It should improve the information security by making people conscious about dangers. An information security policy document together with its attachments is a complex plan of information protection in a large organization.
引用
收藏
页码:376 / 380
页数:5
相关论文
共 50 条
  • [41] The role of norms in information security policy compliance
    Wiafe, Isaac
    Koranteng, Felix Nti
    Wiafe, Abigail
    Obeng, Emmanuel Nyarko
    Yaokumah, Winfred
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (05) : 743 - 761
  • [42] Psychological Capital and Information Security Policy Compliance
    Zhao, Jiaqing
    Hong, Yuxiang
    Chen, Wenqing
    Chen, Chouyong
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [43] A security policy model for clinical information systems
    Anderson, RJ
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 30 - 43
  • [44] Security Policy Integration Method for Information Systems
    Tran, Trong Hieu
    Nguyen, Ngoc Thanh
    [J]. 2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 220 - 225
  • [45] THE POLICY INFORMATION AS A DETERMINANT OF SECURITY IN THE SUPPLY CHAIN
    Zywiolek Justyna
    [J]. CARPATHIAN LOGISTICS CONGRESS (CLC' 2016), 2017, : 77 - 81
  • [46] Design of a LDAP schema based on network security policy information model for storing security policy
    Kim, G
    Na, JC
    Sohn, S
    [J]. SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
  • [47] The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions
    Chen, Lin
    Xie, Zongxiao
    Zhen, Jie
    Dong, Kunxiang
    [J]. PSYCHOLOGY RESEARCH AND BEHAVIOR MANAGEMENT, 2022, 15 : 1177 - 1191
  • [48] Reducing fraud in organizations through information security policy compliance: An information security controls perspective
    Brown, Dennis
    Batra, Gunjan
    Zafar, Humayun
    Saeed, Khawaja
    [J]. Computers and Security, 2024, 144
  • [49] Limitations of the Information Security Management System Assessment Approaches in the Context of Information Security Policy Assessment
    Corpuz, Maria Soto
    [J]. WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV (POST-CONFERENCE EDITION), 2010, : 148 - 150
  • [50] The Contribution of Military Members in Creating a Transparent Security Policy: the Case of Poland
    Blazhevska, Katerina Veljanovska
    Babanoski, Kire
    [J]. ROMANIAN JOURNAL OF POLITICAL SCIENCE, 2016, 16 (01): : 163 - 190