메뉴 건너뛰기




Volumn 5, Issue 5, 1997, Pages 182-190

Internet acceptable usage policy for organizations

Author keywords

Computer networks; Internet; Policy; Security

Indexed keywords


EID: 84986173272     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685229710367726     Document Type: Article
Times cited : (12)

References (51)
  • 5
    • 84986105413 scopus 로고
    • “Security policy for use of the national research and education network”, inederal Networking Council, FEDERAL INTERNET SECURITY - A Framework for Action, Draft, Appendix 4
    • Branstad, D., Oldehoff, A., Aiken, R. et al. (1995), “Security policy for use of the national research and education network”, inederal Networking Council, FEDERAL INTERNET SECURITY - A Framework for Action, Draft, Appendix 4.
    • (1995)
    • Branstad, D.1    Oldehoff, A.2    Aiken, R.3
  • 6
    • 0041177651 scopus 로고
    • Business value, quality and partnerships: Australasian information systems management issues
    • Broadbent, M., Butler, C., Hansell, A. and Dampney, C.N.G. (1995), “Business value, quality and partnerships: Australasian information systems management issues”, Australian Computer Journal, Vol. 27 No. 1.
    • (1995) Australian Computer Journal , vol.27 , Issue.1
    • Broadbent, M.1    Butler, C.2    Hansell, A.3    Dampney, C.N.G.4
  • 15
    • 10444290409 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • No. L. 281, 23 November
    • EC (1995), “Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data”, Official Journal of the European Communities, No. L. 281, 23 November.
    • (1995) Official Journal of the European Communities
  • 16
    • 84993043242 scopus 로고    scopus 로고
    • The Ernst & Young International Information Security Survey 1995
    • Ernst & Young (1996), “The Ernst & Young International Information Security Survey 1995”, Information Management & Computer Security, Vol. 4 No. 4.
    • (1996) Information Management & Computer Security , vol.4 , Issue.4
  • 17
    • 84986085436 scopus 로고
    • Federal Networking Council, Security Working Group
    • FNC (Federal Networking Council) (1995a, Federal Internet Security Plan (FISP), Federal Networking Council, Security Working Group.
    • (1995) Federal Internet Security Plan (FISP)
  • 19
    • 0008464478 scopus 로고
    • Comprehensive information technology security: a new approach to respond ethical and social issues surrounding information security in the 21st Century
    • Eloff, J.H.P. and Von Solms, H.S. (Eds), Chapman & Hall, London
    • Hartmann, A. (1995), “Comprehensive information technology security: a new approach to respond ethical and social issues surrounding information security in the 21st Century”, in Eloff, J.H.P. and Von Solms, H.S. (Eds), Information Security - the Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, Chapman & Hall, London.
    • (1995) Information Security - the Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security
    • Hartmann, A.1
  • 20
    • 84986047240 scopus 로고    scopus 로고
    • Internet security policies and Internet appropriate use policies
    • Perth
    • Heard, F.T. (1996), “Internet security policies and Internet appropriate use policies”, Proceedings of EDPAC 96 Conference, Perth.
    • (1996) Proceedings of EDPAC 96 Conference
    • Heard, F.T.1
  • 22
    • 84986085406 scopus 로고
    • From social requirements to technical solutions – bridging the gap with user-oriented data security
    • Eloff, J.H.P. and Von Solms, H.S. (Eds), IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, Chapman & Hall, London
    • Kohl, U. (1995), “From social requirements to technical solutions – bridging the gap with user-oriented data security”, in Eloff, J.H.P. and Von Solms, H.S. (Eds), Information Security - The Next Decade, IFIP/Sec '95, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, Chapman & Hall, London.
    • (1995) Information Security - The Next Decade
    • Kohl, U.1
  • 24
    • 0040973657 scopus 로고    scopus 로고
    • Internet acceptable usage policy
    • Elsevier Advanced Technology, Barking, December
    • Lichtenstein, S. (1996a, “Internet acceptable usage policy”, Computer Audit Update, Elsevier Advanced Technology, Barking, December.
    • (1996) Computer Audit Update
    • Lichtenstein, S.1
  • 25
    • 84986085419 scopus 로고    scopus 로고
    • Internet security policy: a holistic and organisational approach
    • Bossomaier, T. and Chubb, L. (Eds), AUUG'96 and Asia Pacific World Wide Web, World Congress Centre, Melbourne
    • Lichtenstein, S. (1996b, “Internet security policy: a holistic and organisational approach”, in Bossomaier, T. and Chubb, L. (Eds), Proceedings of 2nd Joint Conference AUUG 96/APWWW, AUUG'96 and Asia Pacific World Wide Web, World Congress Centre, Melbourne.
    • (1996) Proceedings of 2nd Joint Conference AUUG 96/APWWW
    • Lichtenstein, S.1
  • 26
    • 84986064967 scopus 로고    scopus 로고
    • working paper 10/96, Department of Information Systems, Monash University, Melbourne
    • Lichtenstein, S. (1996c, Internet Acceptable Usage Policy: Human Issues, working paper 10/96, Department of Information Systems, Monash University, Melbourne.
    • (1996) Internet Acceptable Usage Policy: Human Issues
    • Lichtenstein, S.1
  • 27
    • 0031361308 scopus 로고    scopus 로고
    • Developing Internet security policy for organisations
    • Nunamaker, J.F. and Sprague, R.H. (Eds), Hawaii, IEEE Computer Society Press, Los Alamitos, CA
    • Lichtenstein, S. (1997), “Developing Internet security policy for organisations”, in Nunamaker, J.F. and Sprague, R.H. (Eds), Proceedings of the Thirtieth Annual Hawaii International Conference on Systems Sciences, Hawaii, IEEE Computer Society Press, Los Alamitos, CA.
    • (1997) Proceedings of the Thirtieth Annual Hawaii International Conference on Systems Sciences
    • Lichtenstein, S.1
  • 28
    • 0039194764 scopus 로고    scopus 로고
    • Internet acceptable usage policy: arguments and perils
    • Swatman, P.M.C Swatman, P. and Cooper, J. (Eds), Brisbane
    • Lichtenstein, S. and Swatman, P.M.C. (1997), “Internet acceptable usage policy: arguments and perils”, in Swatman, P.M.C., Swatman, P. and Cooper, J. (Eds), Proceedings of PAWEC '97, Brisbane.
    • (1997) Proceedings of PAWEC '97
    • Lichtenstein, S.1    Swatman, P.M.C.2
  • 29
    • 84986082064 scopus 로고    scopus 로고
    • Alignment: how to do business on the Internet
    • Logan, M. and Logan, R. (1996), “Alignment: how to do business on the Internet”, Proceedings INET 96.
    • (1996) Proceedings INET 96
    • Logan, M.1    Logan, R.2
  • 35
    • 84986180461 scopus 로고
    • Mega Project III of the National Information Infrastructure Advisory Council, USA
    • NIIAC (1995), Commentary on the Privacy and Related Security Principles, Mega Project III of the National Information Infrastructure Advisory Council, USA.
    • (1995) Commentary on the Privacy and Related Security Principles
  • 38
  • 39
    • 0031346151 scopus 로고    scopus 로고
    • Corporate policies for electronic commerce
    • Nunamaker, J.F. and Sprague, R.H. (Eds), Hawaii, IEEE Computer Society Press, Los Alamitos, CA
    • Oliver, R.W. (1997), “Corporate policies for electronic commerce”, in Nunamaker, J.F. and Sprague, R.H. (Eds), Proceedings of the Thirtieth Annual Hawaii International Conference on Systems Sciences, Hawaii, IEEE Computer Society Press, Los Alamitos, CA.
    • (1997) Proceedings of the Thirtieth Annual Hawaii International Conference on Systems Sciences
    • Oliver, R.W.1
  • 40
    • 0242613535 scopus 로고
    • Information security policy
    • Abrams, M.D. Jajodia, S. and Podell, H.J. (Eds), IEEE Computer Society Press, Los Alamitos, CA
    • Olson, I.M. and Abrams, M.D. (1995), “Information security policy”, in Abrams, M.D., Jajodia, S. and Podell, H.J. (Eds), Information Security - an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA.
    • (1995) Information Security - an Integrated Collection of Essays
    • Olson, I.M.1    Abrams, M.D.2
  • 42
    • 0347241358 scopus 로고
    • ‘The Internet for small businesses: an enabling infrastructure for competitiveness”, roceedings of the Fifth Internet Society Conference, Hawaii, June
    • Poon, S. and Swatman, P.M.C. (1995), ‘The Internet for small businesses: an enabling infrastructure for competitiveness”, roceedings of the Fifth Internet Society Conference, Hawaii, June, pp. 221-31.
    • (1995) , pp. 221-231
    • Poon, S.1    Swatman, P.M.C.2
  • 44
  • 45
    • 0027929095 scopus 로고
    • Recent development in information technology security evaluation - the need for evaluation criteria for multilateral security
    • Sizer, R. Yngstrom, L. Kaspersen, H. and Fischer-Hubner, S. (Eds), IFIP Transactions A43, Elsevier Science B.V., Amsterdam
    • Rannenberg, K. (1994), “Recent development in information technology security evaluation - the need for evaluation criteria for multilateral security”, in Sizer, R., Yngstrom, L., Kaspersen, H. and Fischer-Hubner, S. (Eds), Proceedings Security and Control of Information Technology in Society, IFIP Transactions A43, Elsevier Science B.V., Amsterdam.
    • (1994) Proceedings Security and Control of Information Technology in Society
    • Rannenberg, K.1
  • 47
    • 84986133489 scopus 로고    scopus 로고
    • The Internet Outsourcing Group, April, (accessed 18 October 1996)
    • TIOcom (1996), Terms and Conditions for User Access and User Services, The Internet Outsourcing Group, http://www.tio.com/ terms.tml, 27 April, (accessed 18 October 1996).
    • (1996) Terms and Conditions for User Access and User Services
  • 49
    • 0000613590 scopus 로고
    • Writing InfoSec policies
    • Wood, C.C. (1995), “Writing InfoSec policies”, Computers & Security, Vol. 14.
    • (1995) Computers & Security , vol.14
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.