Implementation of Information Systems Security Policies: A Survey in Small and Medium Sized Enterprises

被引:5
作者
Lopes, Isabel [1 ]
Oliveira, Pedro [1 ]
机构
[1] Polytech Inst Braganca, Sch Technol & Management, Braganca, Portugal
来源
NEW CONTRIBUTIONS IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, PT 1 | 2015年 / 353卷
关键词
Information Security; Information Systems Security Policies; Small and Medium Sized Enterprises;
D O I
10.1007/978-3-319-16486-1_45
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information has become organizations' most valuable asset, thus being a potential target to threats intending to explore their vulnerabilities and cause considerable damage. Therefore, there is a need to implement policies regarding information systems security (ISS) in an attempt to reduce the chances of fraud or information loss. Thus, it is important to find the critical success factors to the implementation of a security policy as well as to assess the level of importance of each one of them. This paper contributes to the identification of such factors by presenting the results of a survey regarding information systems security policies in small and medium sized enterprises (SME). We discuss the results in the light of a literature framework and identify future works aiming to enhance information security in organizations.
引用
收藏
页码:459 / 468
页数:10
相关论文
共 11 条
[1]  
[Anonymous], THESIS
[2]  
[Anonymous], 2005, 27002 ISOIEC
[3]  
Beal A., 2005, SEGURANCA INFORM PRI
[4]  
BEATSON JG, 1992, IFIP TRANS A, V15, P35
[5]   Information system security management in the new millennium [J].
Dhillon, G ;
Backhouse, J .
COMMUNICATIONS OF THE ACM, 2000, 43 (07) :125-128
[6]   Installing an appropriate information security policy [J].
Gaunt, N .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 1998, 49 (01) :131-134
[7]  
*ISO IEC, 2005, 17799 ISOIEC
[8]   Information systems security policies: a contextual perspective [J].
Karyda, M ;
Kiountouzis, E ;
Kokolakis, S .
COMPUTERS & SECURITY, 2005, 24 (03) :246-260
[9]  
Lopes I., 2012, THESIS
[10]  
Siponen M. T., 2000, Information Management & Computer Security, V8, P31, DOI 10.1108/09685220010371394