2003
DOI: 10.1002/nem.472
|View full text |Cite
|
Sign up to set email alerts
|

Development of security policies for private networks

Abstract: With the current worldwide emphasis on e-business, the development of sound network security policies for private networks connected to the Internet is becoming of increasing importance. This paper identifies a general network security profile upon which current and planned network security states can be mapped. The paper also provides a process for the development of current security states into target states, using the network security profile.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2004
2004
2021
2021

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 2 publications
0
11
0
Order By: Relevance
“…Translating research findings and recommendations of any nature into practice remains an elusive process (Kent, 2019;Grimshaw et al, 2012;Kitson et al, 1998). Some of the reasons why this general disconnect exists between most types of research and the related acceptance thereof in practice include: ambiguity in existing research (Kent, 2019;Tsohou et al, 2008); limited published reflection on implementation (Tsohou et al, 2008); ongoing research is often still inconclusive (Kitson et al, 1998); decision-makers lack the required information (Haines and Donald, 1998); and attitudes and beliefs of individuals (Kent, 2019;Bakry, 2003) which translates to social and cultural resistance to the change associated with implementation.…”
Section: Contextualisationmentioning
confidence: 99%
“…Translating research findings and recommendations of any nature into practice remains an elusive process (Kent, 2019;Grimshaw et al, 2012;Kitson et al, 1998). Some of the reasons why this general disconnect exists between most types of research and the related acceptance thereof in practice include: ambiguity in existing research (Kent, 2019;Tsohou et al, 2008); limited published reflection on implementation (Tsohou et al, 2008); ongoing research is often still inconclusive (Kitson et al, 1998); decision-makers lack the required information (Haines and Donald, 1998); and attitudes and beliefs of individuals (Kent, 2019;Bakry, 2003) which translates to social and cultural resistance to the change associated with implementation.…”
Section: Contextualisationmentioning
confidence: 99%
“…Development of security practices for networks has always been a popular research area . However, trust in WSNs is an open and challenging research area.…”
Section: Related Workmentioning
confidence: 99%
“…One of the major requirements of such diffusion is, for all the parties concerned, to manage their information security according to an 'agreed standard', so that they can exchange information under a common environment, with acceptable safety [9].…”
Section: Introductionmentioning
confidence: 99%
“…It has been developed as an integrating tool in the investigation of issues concerned with the use of ICT [6]. It has been used for the evaluation of different problems, including e-government planning [7], e-readiness assessment [12], and information security management [9].…”
Section: Introductionmentioning
confidence: 99%