|
Volumn , Issue , 2002, Pages 153-156
|
Developing an enterprise information security policy
|
Author keywords
Compliance; Data security; Network management; Network security; Policies; Regulation; Security; Unauthorized access
|
Indexed keywords
INFORMATION MANAGEMENT;
INFORMATION TECHNOLOGY;
LAWS AND LEGISLATION;
MATHEMATICAL MODELS;
MIDDLEWARE;
REGULATORY COMPLIANCE;
SOCIETIES AND INSTITUTIONS;
SOFTWARE ENGINEERING;
STRATEGIC PLANNING;
STUDENTS;
ENTERPRISE INFORMATION SECURITY POLICY;
FEDERAL REGULATIONS;
NETWORK MANAGEMENT;
UNAUTHORIZED ACCESS;
SECURITY OF DATA;
|
EID: 0038349341
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/588646.588678 Document Type: Conference Paper |
Times cited : (23)
|
References (0)
|