메뉴 건너뛰기




Volumn 11, Issue 2-3, 2003, Pages 106-114

The application of information security policies in large UK-based organizations: An exploratory investigation

Author keywords

Data security; Information systems; Policy audit; United Kingdom

Indexed keywords

INFORMATION DISSEMINATION; PUBLIC POLICY; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 0042363355     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220310480381     Document Type: Article
Times cited : (66)

References (22)
  • 3
    • 0041983747 scopus 로고    scopus 로고
    • Strategy paper
    • 28 February
    • Arnott, S. (2002), "Strategy paper", Computing, Vol. 16, 28 February.
    • (2002) Computing , vol.16
    • Arnott, S.1
  • 4
    • 0041482690 scopus 로고    scopus 로고
    • The evaluation and certification of information security against BS 7799
    • Barnard, L. and von Solms, R. (1998), "The evaluation and certification of information security against BS 7799", Information Management & Computer Security, Vol. 6 No. 2, pp. 72-7.
    • (1998) Information Management & Computer Security , vol.6 , Issue.2 , pp. 72-77
    • Barnard, L.1    Von Solms, R.2
  • 7
    • 0041482689 scopus 로고    scopus 로고
    • Technical Report, April, DTI, London
    • Department of Trade and Industry (DTI) (2000), Information Security Breaches Survey 2000, Technical Report, April, DTI, London.
    • (2000) Information Security Breaches Survey 2000
  • 8
    • 33947111683 scopus 로고    scopus 로고
    • Technical Report, April, DTI, London
    • Department of Trade and Industry (DTI) (2002), Information Security Breaches Survey 2002, Technical Report, April, DTI, London.
    • (2002) Information Security Breaches Survey 2002
  • 9
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G. and Backhouse, J. (2001), "Current directions in IS security research: towards socio-organizational perspectives", Information Systems Journal, Vol. 11, pp. 127-53.
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 10
    • 84993016651 scopus 로고    scopus 로고
    • The second annual global information security survey
    • Dinnie, G. (1999), "The Second Annual Global Information Security Survey", Information Management & Computer Security, Vol. 7 No. 3, pp. 112-20.
    • (1999) Information Management & Computer Security , vol.7 , Issue.3 , pp. 112-120
    • Dinnie, G.1
  • 11
    • 0042985321 scopus 로고    scopus 로고
    • Ernst & Young, London
    • Ernst & Young (2001), Information Security Survey, Ernst & Young, London.
    • (2001) Information Security Survey
  • 12
    • 0032715522 scopus 로고    scopus 로고
    • Computer hacking and cyber terrorism: The real threats of the new millennium?
    • Furnell, S.M. and Warren, M.J. (1999), "Computer hacking and cyber terrorism: the real threats of the new millennium?", Computers and Security, Vol. 18 No. 1, pp. 28-34.
    • (1999) Computers and Security , vol.18 , Issue.1 , pp. 28-34
    • Furnell, S.M.1    Warren, M.J.2
  • 14
    • 0041482688 scopus 로고    scopus 로고
    • Corporate system security: Towards an integrated management approach
    • Higgins, H.N. (1999), "Corporate system security: towards an integrated management approach", Information Management & Computer Security, Vol. 7 No. 5, pp 217-22.
    • (1999) Information Management & Computer Security , vol.7 , Issue.5 , pp. 217-222
    • Higgins, H.N.1
  • 15
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy - What do international security standards say?
    • Hone, K. and Eloff, J.H.P. (2002), "Information security policy - what do international security standards say?", Computers & Security, Vol. 21 No. 5, pp. 402-9.
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 402-409
    • Hone, K.1    Eloff, J.H.P.2
  • 17
    • 0000133760 scopus 로고
    • Threats to information systems - Today's reality, yesterday's understanding
    • Lock, K.D., Carr, H.H. and Warkentin, M.E. (1992), "Threats to information systems - today's reality, yesterday's understanding", MIS Quarterly, Vol. 16 No. 2, pp. 173-86.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Lock, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 18
    • 0002495427 scopus 로고
    • Policies, procedures and standards: An approach for implementation
    • Moule, B. and Giavara, L. (1995), "Policies, procedures and standards: an approach for implementation". Information Management & Computer Security, Vol. 3 No. 3, pp. 7-16.
    • (1995) Information Management & Computer Security , vol.3 , Issue.3 , pp. 7-16
    • Moule, B.1    Giavara, L.2
  • 19
    • 0041983746 scopus 로고    scopus 로고
    • Management trade-offs in anti-virus strategies
    • Post, G. and Kagan, A. (2000), "Management trade-offs in anti-virus strategies", Information & Management, Vol. 37 No. 1, pp. 13-24.
    • (2000) Information & Management , vol.37 , Issue.1 , pp. 13-24
    • Post, G.1    Kagan, A.2
  • 20
    • 0001775054 scopus 로고
    • An empirical assessment of information systems planning and the role of information systems in organisations
    • Prembukar, G. and King, W.R. (1992), "An empirical assessment of information systems planning and the role of information systems in organisations", Journal of Management Information Systems, Vol. 19 No. 2, pp. 99-125.
    • (1992) Journal of Management Information Systems , vol.19 , Issue.2 , pp. 99-125
    • Prembukar, G.1    King, W.R.2
  • 21
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M. T. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 22
    • 3242661193 scopus 로고    scopus 로고
    • Information security management (1): Why information security is so important
    • von Solms, R. (1998), "Information security management (1): why information security is so important", Information Management & Computer Security, Vol. 6 No. 5, pp. 224-5.
    • (1998) Information Management & Computer Security , vol.6 , Issue.5 , pp. 224-225
    • Von Solms, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.