Challenges in Implementing Information Security Policies

@inproceedings{Reichard2011ChallengesII,
  title={Challenges in Implementing Information Security Policies},
  author={Andreas Reichard and Gerald Quirchmayr and Christopher C. Wills},
  booktitle={HAISA},
  year={2011}
}
The goal of the research described in this paper is to identify challenges related to the successful implementation of information security policies and to develop an approach for overcoming them. Based on an analysis of the literature and the results of interviews with domain experts in the telecommunications industry, a framework for addressing the identified challenges is introduced. 

From This Paper

Figures, tables, and topics from this paper.
1 Citations
18 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 18 references

Building an Information Security Awareness Programme

  • M. B. Desman
  • CRC Press LLC, Boca Raton,
  • 2002
Highly Influential
3 Excerpts

Handbook of Research on Social and Organizational Liabilities in Information Security

  • M. Gupta, R. Sharman
  • Information Science Reference (an imprint of IGI…
  • 2009

Counter Hack reloaded

  • E. Skoudis, T Liston
  • 2006

The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers

  • K. D. Mitnick
  • 2006

allegations”, http://www.oaic.gov.au/news/media_release_vodafone.html

  • C. P. Pfleeger, L PfleegerS.
  • Upper Saddle River,
  • 2003

A prototype tool for information security awareness and training

  • S. M. Furnell, M. Gennatou, P. S. Dowland
  • Journal of Enterprise
  • 2002

Similar Papers

Loading similar papers…