메뉴 건너뛰기




Volumn 29, Issue 6, 2009, Pages 449-457

The information security policy unpacked: A critical study of the content of university policies

Author keywords

Higher education sector; Information security policies; Policy content; Security breaches

Indexed keywords

INDUSTRIAL MANAGEMENT; SECURITY SYSTEMS;

EID: 70449596008     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2009.05.003     Document Type: Article
Times cited : (86)

References (54)
  • 4
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard D., and Arief B. Computer security impaired by legitimate users. Computers & Security 23 (2004) 253-264
    • (2004) Computers & Security , vol.23 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 5
    • 0346788758 scopus 로고    scopus 로고
    • Paradox lost? Firm-level evidence on the returns to information systems
    • Brynjolfsson E., and Hitt L. Paradox lost? Firm-level evidence on the returns to information systems. Management Science 42 4 (1996) 541-558
    • (1996) Management Science , vol.42 , Issue.4 , pp. 541-558
    • Brynjolfsson, E.1    Hitt, L.2
  • 8
    • 0036398120 scopus 로고    scopus 로고
    • Policy enforcement in the workplace
    • David J. Policy enforcement in the workplace. Computers and Security 21 6 (2002) 506-513
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 506-513
    • David, J.1
  • 9
    • 12444282670 scopus 로고    scopus 로고
    • Securing knowledge in organizations: Lessons from the defence and intelligence sectors
    • Desouza K.C., and Vanapalli G.K. Securing knowledge in organizations: Lessons from the defence and intelligence sectors. International Journal of Information Management 25 (2005) 85-98
    • (2005) International Journal of Information Management , vol.25 , pp. 85-98
    • Desouza, K.C.1    Vanapalli, G.K.2
  • 11
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon G., and Backhouse J. Information system security management in the new millennium. Communications of the ACM 43 7 (2000) 125-128
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 12
    • 70449576952 scopus 로고    scopus 로고
    • Realizing benefits of an information security program
    • Dhillon G. Realizing benefits of an information security program. Business Process Management Journal 10 3 (2004) 21-22
    • (2004) Business Process Management Journal , vol.10 , Issue.3 , pp. 21-22
    • Dhillon, G.1
  • 13
    • 33744830087 scopus 로고    scopus 로고
    • Value-focused assessment of information system security in organizations
    • Dhillon G., and Torkzadeh G. Value-focused assessment of information system security in organizations. Information Systems Journal 16 3 (2006) 293-314
    • (2006) Information Systems Journal , vol.16 , Issue.3 , pp. 293-314
    • Dhillon, G.1    Torkzadeh, G.2
  • 14
    • 0042692977 scopus 로고    scopus 로고
    • The impact of inadequacies in the treatment of organizational issues on information systems development projects
    • Doherty N.F., King M., and Al-Mushayt O. The impact of inadequacies in the treatment of organizational issues on information systems development projects. Information and Management 41 1 (2003) 49-62
    • (2003) Information and Management , vol.41 , Issue.1 , pp. 49-62
    • Doherty, N.F.1    King, M.2    Al-Mushayt, O.3
  • 15
    • 25144436981 scopus 로고    scopus 로고
    • Do information security policies reduce the incidence of security breaches: An exploratory analysis
    • Doherty N.F., and Fulford H. Do information security policies reduce the incidence of security breaches: An exploratory analysis. Information Resources Management Journal 18 4 (2005) 21-38
    • (2005) Information Resources Management Journal , vol.18 , Issue.4 , pp. 21-38
    • Doherty, N.F.1    Fulford, H.2
  • 17
    • 0001903311 scopus 로고
    • The coming of the new organization
    • Drucker P.F. The coming of the new organization. Harvard Business Review 66 1 (1988) 45-53
    • (1988) Harvard Business Review , vol.66 , Issue.1 , pp. 45-53
    • Drucker, P.F.1
  • 18
    • 0042363355 scopus 로고    scopus 로고
    • The application of information security policies in large UK-based organizations
    • Fulford H., and Doherty N.F. The application of information security policies in large UK-based organizations. Information Management and Computer Security 11 3 (2003) 106-114
    • (2003) Information Management and Computer Security , vol.11 , Issue.3 , pp. 106-114
    • Fulford, H.1    Doherty, N.F.2
  • 21
    • 54949146918 scopus 로고    scopus 로고
    • Implementation and effectiveness of organizational information security measures
    • Hagen J.M., Albrechtsen E., and Hovden J. Implementation and effectiveness of organizational information security measures. Information Management & Computer Security 16 4 (2008) 377-397
    • (2008) Information Management & Computer Security , vol.16 , Issue.4 , pp. 377-397
    • Hagen, J.M.1    Albrechtsen, E.2    Hovden, J.3
  • 22
    • 0041482688 scopus 로고    scopus 로고
    • Corporate system security: Towards an integrated management approach
    • Higgins H.N. Corporate system security: Towards an integrated management approach. Information Management and Computer Security 7 5 (1999) 217-222
    • (1999) Information Management and Computer Security , vol.7 , Issue.5 , pp. 217-222
    • Higgins, H.N.1
  • 23
    • 0036299585 scopus 로고    scopus 로고
    • Security surveys spring crop
    • Hinde S. Security surveys spring crop. Computers and Security 21 4 (2002) 310-321
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 310-321
    • Hinde, S.1
  • 24
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy-What do international security standards say
    • Hone K., and Eloff J.H.P. Information security policy-What do international security standards say. Computers & Security 21 5 (2002) 402-409
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 402-409
    • Hone, K.1    Eloff, J.H.P.2
  • 25
    • 0036613095 scopus 로고    scopus 로고
    • What makes an effective information security policy
    • Hone K., and Eloff J.H.P. What makes an effective information security policy. Network Security 20 6 (2002) 14-16
    • (2002) Network Security , vol.20 , Issue.6 , pp. 14-16
    • Hone, K.1    Eloff, J.H.P.2
  • 26
    • 33745838617 scopus 로고    scopus 로고
    • An empirical study of information security policy on information security elevation on Taiwan
    • Hong K., Chi Y., Chao L., and Tang J. An empirical study of information security policy on information security elevation on Taiwan. Information Management and Computer Security 14 2 (2006) 104-115
    • (2006) Information Management and Computer Security , vol.14 , Issue.2 , pp. 104-115
    • Hong, K.1    Chi, Y.2    Chao, L.3    Tang, J.4
  • 28
    • 0038825669 scopus 로고    scopus 로고
    • Knowledge management and sustainable competitive advantages: The impact of dynamic contextual training
    • Johannessen J.-A., and Olsen B. Knowledge management and sustainable competitive advantages: The impact of dynamic contextual training. International Journal of Information Management 23 (2003) 277-289
    • (2003) International Journal of Information Management , vol.23 , pp. 277-289
    • Johannessen, J.-A.1    Olsen, B.2
  • 29
    • 18844431067 scopus 로고    scopus 로고
    • Information security policies: A contextual perspective
    • Karyda M., Kiountouzis E., and Kokolakis S. Information security policies: A contextual perspective. Computers & Security 24 3 (2005) 246-260
    • (2005) Computers & Security , vol.24 , Issue.3 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 30
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic A.J., and Clark J.G. Why there aren't more information security research studies. Information and Management 41 5 (2004) 597-607
    • (2004) Information and Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.J.1    Clark, J.G.2
  • 31
    • 0029545652 scopus 로고
    • A new model for information security policies
    • Lindup K.R. A new model for information security policies. Computers & Security 14 (1995) 691-695
    • (1995) Computers & Security , vol.14 , pp. 691-695
    • Lindup, K.R.1
  • 33
    • 3242801473 scopus 로고    scopus 로고
    • Techno-change management: Using IT to drive organizational change
    • Markus M.L. Techno-change management: Using IT to drive organizational change. Journal of Information Technology 19 1 (2004) 4-20
    • (2004) Journal of Information Technology , vol.19 , Issue.1 , pp. 4-20
    • Markus, M.L.1
  • 34
    • 18844425009 scopus 로고    scopus 로고
    • Fostering entrepreneurship: Changing role of government and higher education governance in Hong Kong
    • Mok K.H. Fostering entrepreneurship: Changing role of government and higher education governance in Hong Kong. Research Policy 34 (2005) 537-554
    • (2005) Research Policy , vol.34 , pp. 537-554
    • Mok, K.H.1
  • 35
    • 0002495427 scopus 로고
    • Policies, procedures and standards: An approach for implementation
    • Moule B., and Giavara L. Policies, procedures and standards: An approach for implementation. Information Management and Computer Security 3 3 (1995) 7-16
    • (1995) Information Management and Computer Security , vol.3 , Issue.3 , pp. 7-16
    • Moule, B.1    Giavara, L.2
  • 38
    • 0000842614 scopus 로고
    • How information gives you competitive advantage
    • Porter M.E., and Millar V. How information gives you competitive advantage. Harvard Business Review 63 4 (1985) 149-160
    • (1985) Harvard Business Review , vol.63 , Issue.4 , pp. 149-160
    • Porter, M.E.1    Millar, V.2
  • 40
    • 33846624345 scopus 로고    scopus 로고
    • Using ISO 17799; 2005 Information Security Management: A STOPE view with six sigma approach
    • Saleh M.S., Alrabiah A., and Saad H.B. Using ISO 17799; 2005 Information Security Management: A STOPE view with six sigma approach. International Journal of Network Management 17 1 (2007) 85-97
    • (2007) International Journal of Network Management , vol.17 , Issue.1 , pp. 85-97
    • Saleh, M.S.1    Alrabiah, A.2    Saad, H.B.3
  • 41
    • 33947581075 scopus 로고    scopus 로고
    • Discovering new business models for knowledge-intensive organizations
    • Sheehan N.T., and Stabell C.B. Discovering new business models for knowledge-intensive organizations. Strategy & Leadership 25 2 (2007) 22-29
    • (2007) Strategy & Leadership , vol.25 , Issue.2 , pp. 22-29
    • Sheehan, N.T.1    Stabell, C.B.2
  • 43
    • 30744438863 scopus 로고    scopus 로고
    • An analysis of traditional IS security approaches: implications for research and practice
    • Siponen M.T. An analysis of traditional IS security approaches: implications for research and practice. European Journal of Information Systems 14 3 (2005) 303-315
    • (2005) European Journal of Information Systems , vol.14 , Issue.3 , pp. 303-315
    • Siponen, M.T.1
  • 44
    • 63849112605 scopus 로고    scopus 로고
    • A study of the impact of information technology on firm performance: A flexible production function approach
    • 10.1111/j.1365-2575.2007.00274.x
    • Sircar S., and Choi J. A study of the impact of information technology on firm performance: A flexible production function approach. Information Systems Journal (2007) 10.1111/j.1365-2575.2007.00274.x
    • (2007) Information Systems Journal
    • Sircar, S.1    Choi, J.2
  • 45
    • 3042812983 scopus 로고    scopus 로고
    • The ten deadly sins of information security management
    • von Solms B., and von Solms R. The ten deadly sins of information security management. Computers & Security 23 (2004) 371-376
    • (2004) Computers & Security , vol.23 , pp. 371-376
    • von Solms, B.1    von Solms, R.2
  • 47
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub D.W., and Welke R.J. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22 4 (1998) 441-470
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-470
    • Straub, D.W.1    Welke, R.J.2
  • 48
    • 70449552643 scopus 로고    scopus 로고
    • World University Rankings
    • THES, November 5, supplement. Available at: Accessed December, 2007
    • THES. (2007). World University Rankings, November 5, 2007. The times higher education supplement. Available at: http://www.timeshighereducation.co.uk/Magazines/THES/graphics/WorldRanki ngs2007.pdf Accessed December, 2007.
    • (2007) The times higher education
  • 49
    • 0037399543 scopus 로고    scopus 로고
    • Competitive intelligence in the knowledge economy: What is in it for South African manufacturing enterprises
    • du Toit A.S.A. Competitive intelligence in the knowledge economy: What is in it for South African manufacturing enterprises. International Journal of Information Management 23 (2003) 111-120
    • (2003) International Journal of Information Management , vol.23 , pp. 111-120
    • du Toit, A.S.A.1
  • 52
    • 24644439555 scopus 로고    scopus 로고
    • Information security policy's impact on reporting security incidents
    • Wiant T.L. Information security policy's impact on reporting security incidents. Computers & Security 24 6 (2005) 448-459
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 448-459
    • Wiant, T.L.1
  • 53
    • 1242265154 scopus 로고    scopus 로고
    • In defense of the realm: Understanding threats to information security
    • Whitman. In defense of the realm: Understanding threats to information security. International Journal of Information Management 24 (2004) 3-4
    • (2004) International Journal of Information Management , vol.24 , pp. 3-4
    • Whitman1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.