Definition of Information Systems Security Policies

被引:1
|
作者
Lopes, Isabel Maria [1 ,2 ,3 ]
Pereira, Joao Paulo [2 ,3 ]
Oliveira, Pedro [3 ]
机构
[1] Univ Minho, Ctr ALGORITMI, Braga, Portugal
[2] Inst Politecn Braganca, UNIAG Appl Management Res Unit, Braganca, Portugal
[3] Polytech Inst Braganca, Sch Technol & Management, Braganca, Portugal
来源
RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 3 | 2017年 / 571卷
关键词
Information security; Definition of security policies; Information systems security policies;
D O I
10.1007/978-3-319-56541-5_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information systems security (ISS) is crucial in all and each one of the services provided by organizations. Among security measures, policies assume a central role in literature. A lot has been said about this issue over the last years, however, the analysis of some studies conducted by different authors show that this ISS measure has not yet been institutionalized in most companies. By approaching aspects intrinsically related to ISS policies, this paper aims to contribute suggestions of some actions which might be taken to formulate and implement an ISS policy. Methodologically, the study involved interviewing the officials in charge of information systems in 21 Small and Medium Sized Enterprises (SMEs) in Portugal. The results are discussed in the light of literature and future works are identified with the aim of enabling the implementation of ISS.
引用
收藏
页码:225 / 234
页数:10
相关论文
共 50 条
  • [41] Integrated methods of information security in telecommunication systems
    Zakharchenko, M., V
    Korchynskii, V. V.
    Kildishev, V., I
    2017 SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES AND RADIO ELECTRONICS (UKRMICO), 2017,
  • [42] Key Success Factors of Information Systems Security
    Arbanas, Krunoslav
    Hrustek, Nikolina Zajdela
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2019, 43 (02) : 131 - 144
  • [43] Probabilistic and Deterministic Analysis the Security of Information Systems
    Tun, Hein
    Lupin, Sergey
    Oo, Sabai
    Paing, Aung Nyein
    Oo, Ko Ko
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 591 - 594
  • [44] Integrating information security in the development of telematics systems
    Tettero, O
    Out, DJ
    Franken, HM
    Schot, J
    INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 255 - 266
  • [45] Security threats categories in healthcare information systems
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    HEALTH INFORMATICS JOURNAL, 2010, 16 (03) : 201 - 209
  • [46] Information security aspects of spread spectrum systems
    Imai, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 195 - 208
  • [47] A Security Approach for Health Care Information Systems
    Chiuchisan, Iuliana
    Balan, Doru-Gabriel
    Geman, Oana
    Chiuchisan, Iulian
    Gordin, Ionel
    2017 IEEE INTERNATIONAL CONFERENCE ON E-HEALTH AND BIOENGINEERING CONFERENCE (EHB), 2017, : 721 - 724
  • [48] Optimizing Information Systems Security Design Based on Existing Security Knowledge
    Schilling, Andreas
    Werners, Brigitte
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2015, 2015, 215 : 447 - 458
  • [49] Expert and fuzzy systems application for information security risks assessment of information and telecommunication systems
    Kushch, S. M.
    Shutovskyi, V. O.
    VISNYK NTUU KPI SERIIA-RADIOTEKHNIKA RADIOAPARATOBUDUVANNIA, 2012, (50): : 114 - 120
  • [50] Do it OR ELSE! Exploring the Effectiveness of Deterrence on Employee Compliance with Information Security Policies
    Aurigemma, Sal
    Mattson, Thomas
    AMCIS 2014 PROCEEDINGS, 2014,