• Corpus ID: 15655635

Pacific Asia Conference on Information Systems ( PACIS ) 7-15-2012 Information Security Policies : A Content Analysis

@inproceedings{Lopes2012PacificAC,
  title={Pacific Asia Conference on Information Systems ( PACIS ) 7-15-2012 Information Security Policies : A Content Analysis},
  author={Isabel Maria Lopes},
  year={2012}
}
Among information security controls, the literature gives a central role to information security policies. However, there is a reduced number of empirical studies about the features and components of information security policies. This research aims to contribute to fill this gap. It presents a synthesis of the literature on information security policies content and it characterizes 25 City Councils information security policy documents in terms of features and components. The content analysis… 

Tables from this paper

References

SHOWING 1-10 OF 50 REFERENCES

INFORMATION SYSTEMS SECURITY POLICIES: A SURVEY IN PORTUGUESE PUBLIC ADMINISTRATION

TLDR
The results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal are presented to mitigate this flaw in the number of empirical studies about this policy adoption.

Information systems security policies: a contextual perspective

Information Security Policy Framework: Best Practices for Security Policy in the E-commerce Age

TLDR
By going through the process of developing a relevant, usable policy framework, an organization can make the difficult decisions on the information security program up front, and make implementation of the rest of the program that much easier.

An integrated system theory of information security management

TLDR
It is suggested that an integrated system theory is useful for understanding Information security management, explaining information security management strategies, and predicting management outcomes.

An information security meta‐policy for emergent organizations

TLDR
The meta‐policy establishes how policies are created, implemented and enforced in order to assure that all policies in the organization have features to ensure swift implementation and timely, ongoing validation.

Information Systems Security and the Need for Policy

TLDR
This chapter provides background support for the need for information security policy, and outlines a sample structure that may be used to develop such a policy.

A new model for information security policies

The application of information security policies in large UK-based organizations: an exploratory investigation

TLDR
The results of this research have indicated that, while policies are now fairly common, at least amongst the sample, there is still a high degree of variety in terms of their content and dissemination.

Content, Context, Process Analysis of IS Security Policy Formation

TLDR
This paper aims to contribute to IS security research by bringing forth the issue of context-dependent formation of security policies, and provides a contextual framework, which is expected to improve the effectiveness of IS security policies development.