A Policy that Deters Violation of Security Policy

被引:0
|
作者
Parker, Donn B.
机构
关键词
D O I
10.1145/1978542.1978544
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:7 / 7
页数:1
相关论文
共 50 条
  • [1] Security Policy Compliance with Violation Management
    Brunel, Julien
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Sans, Thierry
    Bodeveix, Jean-Paul
    FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING, 2007, : 31 - 40
  • [2] LEGAL POLICY AND SECURITY POLICY AS ELEMENTS OF SECURITY POLICY
    WEEDE, E
    ARCHIVES EUROPEENNES DE SOCIOLOGIE, 1984, 25 (01): : 147 - 166
  • [3] An Integrated Approach to Information Systems Security Policy Violation: The Case of Ethiopia
    Arage, Tilahun Muluneh
    Tesema, Tibebe Beshah
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 228 - 232
  • [4] Understanding Information Security Policy Violation from a Situational Action Perspective
    Li, Han
    Luo, Xin
    Chen, Yan
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03): : 739 - 772
  • [5] The Policy Machine for security policy management
    Hu, VC
    Frincke, DA
    Ferraiolo, DF
    COMPUTATIONAL SCIENCE -- ICCS 2001, PROCEEDINGS PT 2, 2001, 2074 : 494 - 503
  • [6] SECURITY POLICY
    BANKS, SH
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 464 - 471
  • [7] Policy & Security
    Guynes, et al.
    Computers & Society, 269 (1/2):
  • [8] The violation of HR in front of flows migration and national security policy: an analysis of Americas and Brazil
    Caneiro Santos, Isabelle Dias
    DIREITO E PRAXIS, 2013, 4 (01): : 112 - +
  • [9] SECURITY POLICY AND EUROPEAN SECURITY
    DUCKWITZ, GF
    AUSSEN POLITIK, 1970, 21 (01): : 5 - 13
  • [10] Germany's Foreign Policy and Security Policy
    Froehlich, Stefan
    Gareis, Sven Bernhard
    EUROPEAN REVIEW OF INTERNATIONAL STUDIES, 2023, 10 (01): : 77 - 79