Proceedings of the Thirtieth Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.1997.663407
|View full text |Cite
|
Sign up to set email alerts
|

Developing Internet security policy for organizations

Abstract: This paper describes a rk for developing an organization's Internet security policy. A model of Internet security risks for an Intemet user organization is proposed; the framework utilizes this model, as well as considering important holistic issues, in order to develop the user organization's Intemet security policy.A hierarchy of subpolicies for the Internet security policy is also suggested. This paper presents the results of one phase of a wider investigation into Intemet security policy.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Technical issues were the focus of IS research until recent years, in accord with the now-outdated technical-economic rationality which assumed an organisational goal of economic efficiency and effectiveness via technology deployment (Kumar et at., 1998;Kling, 1980). The focus has recently shifted in both IS and e-business research toward more holistic approaches which integrate the human, social, organisational and technical issues (Baskerville et at., 2000;Bennetts et at., 2000;Cavaye, 1998;Lichtenstein, 1997;Lichtenstein and Swatman, 2001;McMichael, 1999;Russo et a.t, 2001;Vogel, 2001). It can be difficult for case studies (whether positivist, or utilising more interpretivist approaches such as ethnographic surveys or grounded theory approaches) and surveys alone to yield an integrated holistic solution to an e-business research problem, because the method of collection is a single viewpoint, without opportunity for debate between stakeholders.…”
Section: Holistic Approaches To E-business Researchmentioning
confidence: 99%
“…Technical issues were the focus of IS research until recent years, in accord with the now-outdated technical-economic rationality which assumed an organisational goal of economic efficiency and effectiveness via technology deployment (Kumar et at., 1998;Kling, 1980). The focus has recently shifted in both IS and e-business research toward more holistic approaches which integrate the human, social, organisational and technical issues (Baskerville et at., 2000;Bennetts et at., 2000;Cavaye, 1998;Lichtenstein, 1997;Lichtenstein and Swatman, 2001;McMichael, 1999;Russo et a.t, 2001;Vogel, 2001). It can be difficult for case studies (whether positivist, or utilising more interpretivist approaches such as ethnographic surveys or grounded theory approaches) and surveys alone to yield an integrated holistic solution to an e-business research problem, because the method of collection is a single viewpoint, without opportunity for debate between stakeholders.…”
Section: Holistic Approaches To E-business Researchmentioning
confidence: 99%
“…An Internet acceptable usage policy can be positioned within a company's information security management infrastructure. One view (Lichtenstein, 1997) recommends that an organization mount a corporate information security programme containing many elements, one of these being the Internet security management programme featuring an Internet security policy -itself comprising of a number of subpolicies, including: an Internet information protection policy, an Internet information access policy, an Internet publication policy, an Internet employee privacy policy and the Internet acceptable usage policy. An essential point to make here is that the Internet acceptable usage policy serves two major organizational functions -it is not only a security policy, but also an instrument for specifying the valid Internet usages which support the business objectives of the company and maximize added business value.…”
Section: Internet Acceptable Usage Policymentioning
confidence: 99%
“…This process involves negotiating the price of the goods and then negotiating various mechanisms such as how the payment is going to be made, how the goods are to be delivered, whether or not money back guarantee is available, etc. Various models of interaction between the customer and the merchant have been proposed (Lichtenstein, 1997;Minski and Ungureanu, 1998;Amor, 2000). Minski and Ungureanu (1998) have discussed policies such as money back guarantees and mechanisms enforcing these policies.…”
Section: Introductionmentioning
confidence: 99%