Information Security by Words Alone: The Case for Strong Security Policies

被引:1
作者
Arnett, Kirk P. [1 ]
Templeton, Gary F. [2 ]
Vance, David A. [3 ,4 ]
机构
[1] Mississippi State Univ, Coll Business & Ind, Dept Management & Informat Syst, Informat Syst, Mississippi State, MS 39762 USA
[2] Mississippi State Univ, Management Informat Syst, Mississippi State, MS 39762 USA
[3] Olivet Nazarene Univ, Informat Syst, Bourbonnais, IL USA
[4] Olivet Nazarene Univ, Business Informat Syst Program, Bourbonnais, IL USA
关键词
Benchmarking; Data Security; Data Protection; Privacy policy; Security policy;
D O I
10.4018/jisp.2009040106
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Effective information security extends beyond using software controls that are so prominently discussed in the popular and academic literature. There must also be management influence and control. The best way to control information security is through formal policy and measuring the effectiveness of existing policies. The purpose of this research is to determine 1) what security elements are embedded in Web-based information security policy statements and 2) what security-related keywords appear more frequently. The authors use these findings to propose a density measure (the extent to which each policy uses security keywords) as an indicator of policy strength. For these purposes, they examine the security component of privacy policies of Fortune 100 Web sites. The density measure may serve as a benchmark that can be used as a basis for comparison across companies and the development of industry norms.
引用
收藏
页码:84 / 89
页数:6
相关论文
共 9 条
[1]  
[FTC Federal Trade Commission], FACTS FOR BUS
[2]   The application of information security policies in large UK-based organizations: An exploratory investigation [J].
Business School, Loughborough University, Loughborough, Leicestershire, United Kingdom .
Information Management and Computer Security, 2003, 11 (2-3) :106-114
[3]  
Hines M, 2007, EWEEK ENTERPRISE NEW, V23, P13
[4]  
Knapp K. J., 2006, EDPACS, V34, P1, DOI 10.1201/1079.07366981/46351.34.4.20061001/95104.1
[5]  
Liu C, 2002, J COMPUT INFORM SYST, V43, P117
[6]  
Parker D. B., 1996, Information Systems Security, V5, P21
[7]  
Richardson R., 2007, CSI COMPUTER CRIME S
[8]  
Rothberg D, 2006, IT PROS SAY THEY CAN
[9]  
Seltzer L, 2008, PC MAGAZINE SEC 0324