2011
DOI: 10.1016/j.ijinfomgt.2010.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
17
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 39 publications
1
17
0
Order By: Relevance
“…Organizations devise IT usage policies to explicitly indicate to their employees which behaviors are considered appropriate or not with respect to their use of the firm's IT resources [57]. These acceptable IT usage policies allow firms to lessen risks such as transmission of confidential data and trade secrets by employees as well as to prevent Internet abuses in the workplace including spamming, shopping, and gambling [59].…”
Section: It Usage Policiesmentioning
confidence: 99%
“…Organizations devise IT usage policies to explicitly indicate to their employees which behaviors are considered appropriate or not with respect to their use of the firm's IT resources [57]. These acceptable IT usage policies allow firms to lessen risks such as transmission of confidential data and trade secrets by employees as well as to prevent Internet abuses in the workplace including spamming, shopping, and gambling [59].…”
Section: It Usage Policiesmentioning
confidence: 99%
“…Much of the research in this area is relatively limited in scope and refers only to the content of the AUP and what features should appear in an effective policy. A considerable amount of the available literature is written with a professional focus rather than an academic emphasis (Doherty et al, 2011), which is more likely to stress the practicalities of writing and maintaining an AUP rather than any theory behind it. There has been some academic research relating to this topic; Lichtenstein (1996) identified a range of issues that should appear in an effective AUP and grouped them into the following categories: legal, managerial, administrative, operational, technical and human issues.…”
Section: Literature Review Aupmentioning
confidence: 99%
“…These themes have been informed by the literature review, in particular by Sturges (2002) and Doherty et al (2011). The preliminary theme nodes were: It was decided throughout the analysis of the documents that the theme of roles and responsibilities was relatively vague and did not recognise the different accountabilities that were evident within the policy documents.…”
Section: Data Analysis and Codingmentioning
confidence: 99%
“…At this point, numerous security experts believe that implementation of security policy and enforcement are the most sensible approach to protect information systems security [15] and the key to an effective security control program [15] [22]. ‗Development process' [13] [26] and ‗contents' of the security policy are the two elements that mainly determine the effectiveness of security policy [8] [19] [12]. Protection of organizations' information which is progressively stored, processed and disseminated is becoming more intricated and challenging.…”
Section: Introductionmentioning
confidence: 99%