2016
DOI: 10.1016/j.cose.2016.06.002
|View full text |Cite
|
Sign up to set email alerts
|

Information security policy development and implementation: The what, how and who

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
72
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(72 citation statements)
references
References 14 publications
(19 reference statements)
0
72
0
Order By: Relevance
“…Further, a high degree of management involvement (e.g. allocating sufficient resources for the risk assessment process) increases the likelihood of successful process of a security policy construction [6]. This insight is complimented by the observation that also a high degree of employee support (e.g.…”
Section: Introductionmentioning
confidence: 64%
See 3 more Smart Citations
“…Further, a high degree of management involvement (e.g. allocating sufficient resources for the risk assessment process) increases the likelihood of successful process of a security policy construction [6]. This insight is complimented by the observation that also a high degree of employee support (e.g.…”
Section: Introductionmentioning
confidence: 64%
“…However, some research results show that security policy that is based on monitoring alone is far from ideal in fostering users to comply with security procedures [6]. Thereupon, design of a whole security process, starting with problem statements and risk assessment, through identification of threats and risks, setting and implementing security policies, finalizing with result analysis and benchmarking in more favorable than any other way to mitigate the risks and positively influence the awareness of employees [2,6].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Requirements for an information security policy may also originate from known information security issues, an organization's goals and mission, or external stakeholders (Burgemeestre, Hulstijn & Tan 2013, Lopes, Sá-Soares 2010. Requirements for security may be widely different depending on the organization in question (Ølnes 1994), which is why using general templates for policies may be problematic (Flowerday, Tuyikeze 2016).…”
Section: Introductionmentioning
confidence: 99%