Structure and Challenges of a Security Policy on Small and Medium Enterprises

被引:1
作者
Almeida, Fernando [1 ,2 ]
Carvalho, Ines [3 ]
Cruz, Fabio [3 ]
机构
[1] Univ Porto, Fac Engn, INESC TEC, P-4200464 Porto, PT, Portugal
[2] ISPGaya, P-4200464 Porto, PT, Portugal
[3] Higher Inst Gaya, ISPGaya, Sch Comp Sci & Engn, P-4400103 Vila Nova De Gaia, VNG, Portugal
关键词
security policy; SMEs; privacy; information assets; risk management; MANAGEMENT; NETWORKS;
D O I
10.3837/tiis.2018.02.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information Technology (IT) plays an increasingly important role for small and medium-sized enterprises. It has become fundamental for these companies to protect information and IT assets in relation to risks and threats that have grown in recent years. This study aims to understand the importance and structure of an information security policy, using a quantitative study that intends to identify the most important and least relevant elements of an information security policy document. The findings of this study reveal that the top three most important elements in the structure of a security policy are the asset management, security risk management and define the scope of the policy. On the other side, the three least relevant elements include the executive summary, contacts and manual inspection. Additionally, the study reveals that the importance given to each element of the security policy is slightly changed according to the sectors of activity. The elements that show the greatest variability are the review process, executive summary and penalties. On the other side, the purpose of the policy and the asset management present a stable importance for all sectors of activity.
引用
收藏
页码:747 / 763
页数:17
相关论文
共 29 条
[1]  
Abbas J., 2015, Science International-Lahore, V27, P2393
[2]  
Alqatawna J., 2014, Journal of Software Engineering and Applications, V2014, P883, DOI 10.4236/jsea.2014.710079
[3]  
Alshaikh M., 2015, Proceedings of the 26th Australasian Conference on Information Systems, Adelaide, Australia, P1
[4]  
Amrin N., 2014, THESIS
[5]  
Beley S.D., 2013, International Journal of Scientific and Research Publications, V3, P1
[6]   Maturity assessment and process improvement for information security management in small and medium enterprises [J].
Cholez, Herve ;
Girard, Frederic .
JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2014, 26 (05) :496-503
[7]  
Hosseinabadi A., ANN OPERATIONS RES, V229, P451
[8]  
IC3, 2012, INT CRIM REP
[9]  
Kluitenberg H., 2014, P 20 TWENT STUD C IT
[10]  
Korcek F., 2016, ECON REV, V45, P45