메뉴 건너뛰기




Volumn 19, Issue 4, 2010, Pages 281-295

Metrics for characterizing the form of security policies

Author keywords

Breadth; Brevity; Clarity; Information quality; Security policies

Indexed keywords

BREADTH; BREVITY; CLARITY; INFORMATION QUALITY; SECURITY POLICY;

EID: 78649994214     PISSN: 09638687     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jsis.2010.10.002     Document Type: Article
Times cited : (74)

References (90)
  • 1
    • 33645607715 scopus 로고
    • Abstraction and refinement of layered security policy
    • M.D. Abrams, S. Jajodia, H.J. Podell, Berlin: IEEE Computer Society Press New York, NY
    • M.D. Abrams, and D. Bailey Abstraction and refinement of layered security policy M.D. Abrams, S. Jajodia, H.J. Podell, Information Security - An Integrated Collection of Essays. Berlin: 1995 IEEE Computer Society Press New York, NY
    • (1995) Information Security - An Integrated Collection of Essays
    • Abrams, M.D.1    Bailey, D.2
  • 2
    • 27944501654 scopus 로고
    • Ethnographic content analysis
    • D.L. Altheide Ethnographic content analysis Qualitative Sociology 10 1987 65 77
    • (1987) Qualitative Sociology , vol.10 , pp. 65-77
    • Altheide, D.L.1
  • 6
    • 0032018960 scopus 로고    scopus 로고
    • Users' criteria for relevance evaluation: A cross-situational comparison
    • C. Barry, and L. Schamber Users' criteria for relevance evaluation: a cross-situational comparison Information Processing and Management 34 1998 219 236
    • (1998) Information Processing and Management , vol.34 , pp. 219-236
    • Barry, C.1    Schamber, L.2
  • 9
    • 12244306739 scopus 로고    scopus 로고
    • An information security meta-policy for emergent organizations
    • R. Baskerville, and M. Siponen An information security meta-policy for emergent organizations Logistics Information Management 15 5/6 2002 337 346
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 337-346
    • Baskerville, R.1    Siponen, M.2
  • 10
    • 6244307334 scopus 로고
    • Population policy: Personal notes
    • B. Berelson Population policy: personal notes Population Studies 25 2 1971 173 182
    • (1971) Population Studies , vol.25 , Issue.2 , pp. 173-182
    • Berelson, B.1
  • 11
    • 0038312467 scopus 로고    scopus 로고
    • Political Institutions and policy choices: Evidence from the United States
    • T. Besley, and A. Case Political Institutions and policy choices: evidence from the United States Journal of Economic Literature 41 1 2003 7 73
    • (2003) Journal of Economic Literature , vol.41 , Issue.1 , pp. 7-73
    • Besley, T.1    Case, A.2
  • 12
    • 78650021739 scopus 로고
    • Are student newspapers as readable, interesting and thorough as community newspapers? A content analysis of student and community daily newspapers
    • Quebec, Canada, August 5-8, 1992
    • Bodle, J.V., 1992. Are student newspapers as readable, interesting and thorough as community newspapers? A content analysis of student and community daily newspapers. In: Proceedings of 75th Annual Meeting of the Association for Education in Journalism and Mass Communication Montreal. Quebec, Canada, August 5-8, 1992.
    • (1992) Proceedings of 75th Annual Meeting of the Association for Education in Journalism and Mass Communication Montreal
    • Bodle, J.V.1
  • 13
    • 0000214225 scopus 로고    scopus 로고
    • Technology transfer and public policy: A review of research and theory
    • B. Bozeman Technology transfer and public policy: a review of research and theory Research Policy 29 4-5 2000 627 655
    • (2000) Research Policy , vol.29 , Issue.45 , pp. 627-655
    • Bozeman, B.1
  • 14
    • 0037826345 scopus 로고    scopus 로고
    • Finally! Comparative over-time mapping of party policy movement
    • Budge, I., Hans-Dieter, K., Volkens, A., Bara, J., Tanenbaum, E., Fording, R.C., Hearl, D.J., Kim, H.M., McDonald, M.D., Mendes, S.M. (Eds.) Oxford University Press, Oxford
    • Budge, I., Hans-Dieter, K., 2001. Finally! Comparative over-time mapping of party policy movement. In: Budge, I., Hans-Dieter, K., Volkens, A., Bara, J., Tanenbaum, E., Fording, R.C., Hearl, D.J., Kim, H.M., McDonald, M.D., Mendes, S.M. (Eds.), Map-ping Policy Preferences. Estimates for Parties, Electors, and Governments 1945-1998. Oxford University Press, Oxford, pp. 19-50.
    • (2001) Map-ping Policy Preferences. Estimates for Parties, Electors, and Governments 1945-1998 , pp. 19-50
    • Budge, I.1    Hans-Dieter, K.2
  • 15
    • 84880609979 scopus 로고    scopus 로고
    • Best practices in exploratory factor analysis: Four recommendations for getting the most from your analysis
    • A.B. Costello, and J.W. Osborne Best practices in exploratory factor analysis: four recommendations for getting the most from your analysis Practical Assessment, Research & Evaluation 10 7 2005
    • (2005) Practical Assessment, Research & Evaluation , vol.10 , Issue.7
    • Costello, A.B.1    Osborne, J.W.2
  • 17
    • 0004131215 scopus 로고    scopus 로고
    • Cambridge University Press Cambridge, United Kingdom
    • W.A. Dembski The Design Inference 1998 Cambridge University Press Cambridge, United Kingdom
    • (1998) The Design Inference
    • Dembski, W.A.1
  • 20
    • 33744830087 scopus 로고    scopus 로고
    • Value focused assessment of information system security in organizations
    • G. Dhillon, and G. Torkzadeh Value focused assessment of information system security in organizations Information Systems Journal 16 3 2006
    • (2006) Information Systems Journal , vol.16 , Issue.3
    • Dhillon, G.1    Torkzadeh, G.2
  • 22
    • 25144436981 scopus 로고    scopus 로고
    • Do information security policies reduce the incidence of security breaches: An exploratory analysis
    • N.F. Doherty, and H. Fulford Do information security policies reduce the incidence of security breaches: an exploratory analysis Information Resources Management 18 4 2005 21 39
    • (2005) Information Resources Management , vol.18 , Issue.4 , pp. 21-39
    • Doherty, N.F.1    Fulford, H.2
  • 23
    • 0033888206 scopus 로고    scopus 로고
    • The problem of information overload in business organizations: A review on the literature
    • A. Edmunds, and A. Morris The problem of information overload in business organizations: a review on the literature International Journal of Information Management 20 2000 17 28
    • (2000) International Journal of Information Management , vol.20 , pp. 17-28
    • Edmunds, A.1    Morris, A.2
  • 24
    • 78650013571 scopus 로고    scopus 로고
    • Symbol compression ratio for string compression and estimation of Kolmogorov complexity
    • Evans, S., Bush, S.F., 2002. Symbol compression ratio for string compression and estimation of Kolmogorov complexity. In: IEEE International Symposium on Information Theory.
    • (2002) IEEE International Symposium on Information Theory
    • Evans, S.1    Bush, S.F.2
  • 27
    • 37849020734 scopus 로고    scopus 로고
    • Macroeconomic modeling for monetary policy evaluation
    • J. Galí, and M. Gertler Macroeconomic modeling for monetary policy evaluation The Journal of Economic Perspectives 21 4 2007 25 46
    • (2007) The Journal of Economic Perspectives , vol.21 , Issue.4 , pp. 25-46
    • Galí, J.1    Gertler, M.2
  • 29
    • 34247387359 scopus 로고    scopus 로고
    • Biological models of security for virus propagation in computer networks
    • S. Goel, and S.F. Bush Biological models of security for virus propagation in computer networks Login 29 6 2004 49 59
    • (2004) Login , vol.29 , Issue.6 , pp. 49-59
    • Goel, S.1    Bush, S.F.2
  • 30
    • 70349361004 scopus 로고    scopus 로고
    • Managing information security: Demystifying the audit process for security officers
    • S. Goel, D. Pon, and J. Menzies Managing information security: demystifying the audit process for security officers Journal of Information System Security 2 2 2006 25 45
    • (2006) Journal of Information System Security , vol.2 , Issue.2 , pp. 25-45
    • Goel, S.1    Pon, D.2    Menzies, J.3
  • 33
    • 84992276264 scopus 로고
    • Environmental Indicators: A Systematic Approach to Measuring and Reporting on Environmental Policy Performance in the Context of Sustainable Development
    • Hammond, A., Adriaanse, A., Rodenburg, E., Bryant, D., Woodward, R., 1995. Environmental Indicators: A Systematic Approach to Measuring and Reporting on Environmental Policy Performance in the Context of Sustainable Development. World Resources Institute. < http://www.pdf.wri.org/environmentalindicators- bw.pdf >.
    • (1995) World Resources Institute
    • Hammond, A.1    Adriaanse, A.2    Rodenburg, E.3    Bryant, D.4    Woodward, R.5
  • 34
    • 0037244299 scopus 로고    scopus 로고
    • Improving the clarity of journal abstracts in psychology: The case for structure
    • J. Hartley Improving the clarity of journal abstracts in psychology: the case for structure Science Communication 24 2003 366 379
    • (2003) Science Communication , vol.24 , pp. 366-379
    • Hartley, J.1
  • 35
    • 84933481818 scopus 로고    scopus 로고
    • Are structured abstracts easier to read than traditional ones?
    • J. Hartley, and M. Sydes Are structured abstracts easier to read than traditional ones? Journal of Research in Reading 20 1997 122 136
    • (1997) Journal of Research in Reading , vol.20 , pp. 122-136
    • Hartley, J.1    Sydes, M.2
  • 38
    • 0036299585 scopus 로고    scopus 로고
    • Security surveys spring crop
    • S. Hinde Security surveys spring crop Computers and Security 21 4 2002 310 321
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 310-321
    • Hinde, S.1
  • 39
    • 0001105213 scopus 로고
    • A content analysis of ethical policy statements regarding marketing activities
    • R.E. Hite, J.A. Bellizzi, and C. Fraser A content analysis of ethical policy statements regarding marketing activities Journal of Business Ethics 7 10 1988 771 776
    • (1988) Journal of Business Ethics , vol.7 , Issue.10 , pp. 771-776
    • Hite, R.E.1    Bellizzi, J.A.2    Fraser, C.3
  • 40
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy-what do international information security standards say?
    • K. Hone, and J.H.P. Eloff Information security policy-what do international information security standards say? Computers & Security 21 5 2002 402 409
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 402-409
    • Hone, K.1    Eloff, J.H.P.2
  • 41
    • 0036613095 scopus 로고    scopus 로고
    • What makes an effective information security policy?
    • K. Hone, and J.H.P. Eloff What makes an effective information security policy? Network Security 6 2002 14 16
    • (2002) Network Security , vol.6 , pp. 14-16
    • Hone, K.1    Eloff, J.H.P.2
  • 42
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy-what do international information security standards say?
    • K. Hone, and J.H.P. Eloff Information security policy-what do international information security standards say? Computers & Security 21 5 2002 402 409
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 402-409
    • Hone, K.1    Eloff, J.H.P.2
  • 43
    • 33745838617 scopus 로고    scopus 로고
    • An empirical study of information security policy on information security elevation in Taiwan
    • K.-S. Hong, Y.-P. Chi, L.R. Chao, and J.-H. Tang An empirical study of information security policy on information security elevation in Taiwan Information Management & Computer Security 14 2 2006 104 115
    • (2006) Information Management & Computer Security , vol.14 , Issue.2 , pp. 104-115
    • Hong, K.-S.1    Chi, Y.-P.2    Chao, L.R.3    Tang, J.-H.4
  • 46
    • 0032630277 scopus 로고    scopus 로고
    • Information dimension, information overload, and decision quality
    • M.I. Hwang, and J.W. Lin Information dimension, information overload, and decision quality Journal of Information Science 25 3 1999 213 218
    • (1999) Journal of Information Science , vol.25 , Issue.3 , pp. 213-218
    • Hwang, M.I.1    Lin, J.W.2
  • 51
    • 78650016435 scopus 로고    scopus 로고
    • Paper Presented at the Annual Meeting of the International Communication Association, Marriott Hotel, San Diego, CA
    • Jin, Y., Cameron, G.T., 2003. A Content Analysis of Direct Marketing Emails. Paper Presented at the Annual Meeting of the International Communication Association, Marriott Hotel, San Diego, CA.
    • (2003) A Content Analysis of Direct Marketing Emails
    • Jin, Y.1    Cameron, G.T.2
  • 53
    • 62949118066 scopus 로고    scopus 로고
    • Method effects in his survey research: An assessment and recommendation
    • W.R. King, C.Z. Liu, M.H. Haney, and J. He Method effects in his survey research: an assessment and recommendation Communications of the AIS 20 1 2007
    • (2007) Communications of the AIS , vol.20 , Issue.1
    • King, W.R.1    Liu, C.Z.2    Haney, M.H.3    He, J.4
  • 54
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • A.G. Kotulic, and G.J. Clark Why there aren't more information security research studies Information & Management 41 5 2004 597 607
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, G.J.2
  • 57
    • 46049112694 scopus 로고    scopus 로고
    • Annual report readability, current earnings, and earnings persistence
    • Feng Li Annual report readability, current earnings, and earnings persistence Journal of Accounting and Economics 45 2-3 2008 221 247
    • (2008) Journal of Accounting and Economics , vol.45 , Issue.23 , pp. 221-247
    • Li, F.1
  • 60
    • 0003160744 scopus 로고    scopus 로고
    • Structure improves content and peer review of abstracts. Scientific meetings
    • N. McIntosh, G. Duc, and G. Sedin Structure improves content and peer review of abstracts. Scientific meetings European Science Editing 25 1999 43 47
    • (1999) European Science Editing , vol.25 , pp. 43-47
    • McIntosh, N.1    Duc, G.2    Sedin, G.3
  • 61
    • 10844290435 scopus 로고    scopus 로고
    • Consumers' protection of online privacy and identity
    • G.R. Milne, A.J. Rohm, and S. Bahl Consumers' protection of online privacy and identity Journal of Consumer Affairs 38 2 2004 217 232
    • (2004) Journal of Consumer Affairs , vol.38 , Issue.2 , pp. 217-232
    • Milne, G.R.1    Rohm, A.J.2    Bahl, S.3
  • 64
    • 85013137337 scopus 로고    scopus 로고
    • Information security policy framework: Best practices for security policy in the E-commerce age
    • M.E. Palmer, C. Robinson, J.C. Patilla, and E.P. Moser Information security policy framework: best practices for security policy in the E-commerce age Security Management Practices 10 2 2001 13 17
    • (2001) Security Management Practices , vol.10 , Issue.2 , pp. 13-17
    • Palmer, M.E.1    Robinson, C.2    Patilla, J.C.3    Moser, E.P.4
  • 68
    • 78650002574 scopus 로고    scopus 로고
    • Security Awareness - Implementing an Effective Strategy (retrieved3.01.06)
    • Russell, C., 2002. Security Awareness - Implementing an Effective Strategy. < http://www.sans.org/aware/sec-aware.phg > (retrieved 3.01.06).
    • (2002)
    • Russell, C.1
  • 69
    • 84937326418 scopus 로고    scopus 로고
    • Evaluation in complex policy systems
    • I. Sanderson Evaluation in complex policy systems Evaluation 6 4 2000 433 454
    • (2000) Evaluation , vol.6 , Issue.4 , pp. 433-454
    • Sanderson, I.1
  • 70
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • R.S. Sandhu, and P. Samarati Access control: principles and practice IEEE Communications 32 9 1994 40 48
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 74
    • 29144492869 scopus 로고    scopus 로고
    • In poor health: An assessment of privacy policies at direct-to-consumer web sites
    • K. Sheehan In poor health: an assessment of privacy policies at direct-to-consumer web sites Journal of Public Policy & Marketing 24 2 2005 273 283
    • (2005) Journal of Public Policy & Marketing , vol.24 , Issue.2 , pp. 273-283
    • Sheehan, K.1
  • 78
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • D.W. Straub, and R.J. Welke Coping with systems risk: security planning models for management decision making MIS Quarterly 22 4 1998 441 464
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 80
    • 49149130858 scopus 로고    scopus 로고
    • An empirical study of consumer perception and comprehension of web site privacy policy
    • M.W. Vail, J.B. Earp, and A.I. Anton An empirical study of consumer perception and comprehension of web site privacy policy IEEE Transactions on Engineering Management 5 3 2008 442 454
    • (2008) IEEE Transactions on Engineering Management , vol.5 , Issue.3 , pp. 442-454
    • Vail, M.W.1    Earp, J.B.2    Anton, A.I.3
  • 82
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • B. von Solms, and R. von Solms The 10 deadly sins of information security management Computers & Security 23 5 2004 371 376
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 371-376
    • Von Solms, B.1    Von Solms, R.2
  • 85
    • 0039639238 scopus 로고
    • Organizational computer security policy: The reality
    • A.R. Warman Organizational computer security policy: the reality European Journal of Information Systems 1 5 1992 305 310
    • (1992) European Journal of Information Systems , vol.1 , Issue.5 , pp. 305-310
    • Warman, A.R.1
  • 88
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • M. Whitman Enemy at the gate: threats to information security Communications of the ACM 46 2003 91 95
    • (2003) Communications of the ACM , vol.46 , pp. 91-95
    • Whitman, M.1
  • 90
    • 0018019231 scopus 로고
    • Compression of individual sequences via variable-rate coding
    • J. Ziv, and A. Lempel Compression of individual sequences via variable-rate coding IEEE Transactions on Information Theory 24 1978 530 536
    • (1978) IEEE Transactions on Information Theory , vol.24 , pp. 530-536
    • Ziv, J.1    Lempel, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.