Academic literature on the topic 'Information systems security policy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information systems security policy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information systems security policy"
Nsoh, Michael Warah, Kathleen Hargiss, and Caroline Howard. "Information Systems Security Policy Compliance." International Journal of Strategic Information Technology and Applications 6, no. 2 (April 2015): 12–39. http://dx.doi.org/10.4018/ijsita.2015040102.
Full textHenderson, Stuart. "The Information Systems Security Policy Statement." EDPACS 23, no. 12 (June 1996): 9–18. http://dx.doi.org/10.1080/07366989609451717.
Full textSaadat, Maryam, and Muhammad Umar Abbasi. "Information Security Policy Development: the Mechanism to Ensure Security Over Information Technology Systems." Global International Relations Review IV, no. III (September 30, 2021): 22–30. http://dx.doi.org/10.31703/girr.2021(iv-iii).04.
Full textAmankwa, Eric, Marianne Loock, and Elmarie Kritzinger. "Information Security Policy Compliance Culture." International Journal of Technology and Human Interaction 17, no. 4 (October 2021): 75–91. http://dx.doi.org/10.4018/ijthi.2021100105.
Full textTruchan, Jarosław Radosław. "Selected Security Information Systems." Internal Security 12, no. 2 (December 30, 2020): 38–39. http://dx.doi.org/10.5604/01.3001.0014.6695.
Full textLapke, Michael, and Gurpreet Dhillon. "Disassociations in Security Policy Lifecycles." International Journal of Information Security and Privacy 9, no. 1 (January 2015): 62–77. http://dx.doi.org/10.4018/ijisp.2015010104.
Full textNjenga, Kennedy. "Understanding Internal Information Systems Security Policy Violations as Paradoxes." Interdisciplinary Journal of Information, Knowledge, and Management 12 (2017): 001–15. http://dx.doi.org/10.28945/3639.
Full textDoherty, Neil F., and Heather Fulford. "Aligning the information security policy with the strategic information systems plan." Computers & Security 25, no. 1 (February 2006): 55–63. http://dx.doi.org/10.1016/j.cose.2005.09.009.
Full textButusov, Igor, Pavel Nashchekin, and Aleksandr Romanov. "Theoretical-Semantic Aspects of Integrated Information Systems Security Policy." Voprosy kiberbezopasnosti, no. 1(14) (2016): 9–16. http://dx.doi.org/10.21681/2311-3456-2016-1-9-16.
Full textGritzalis, Dimitris. "A baseline security policy for distributed healthcare information systems." Computers & Security 16, no. 8 (January 1997): 709–19. http://dx.doi.org/10.1016/s0167-4048(97)00009-6.
Full textDissertations / Theses on the topic "Information systems security policy"
Hellqvist, Fredrik. "Design of business information security policy : A case study on Orebro County Council´s work with information security." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35527.
Full textLapke, Michael Stephen. "Power Relationships in Information Systems Security Policy Formulation and Implementation." VCU Scholars Compass, 2008. http://scholarscompass.vcu.edu/etd/1239.
Full textAbdul, Talib Yurita Yakimin. "Intrinsic Motivation and Information Systems Security Policy Compliance in Organizations." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3710.
Full textAliti, Admirim, and Deniz Akkaya. "Employees' Role in Improving Information Systems Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13769.
Full textHarris, Mark. "THE SHAPING OF MANAGERS’ SECURITY OBJECTIVES THROUGH INFORMATION SECURITY AWARENESS TRAINING." VCU Scholars Compass, 2010. http://scholarscompass.vcu.edu/etd/2208.
Full textMarin, Luis Franco. "SELinux policy management framework for HIS." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/26358/1/Luis_Franco_Thesis.pdf.
Full textMarin, Luis Franco. "SELinux policy management framework for HIS." Queensland University of Technology, 2008. http://eprints.qut.edu.au/26358/.
Full textPatterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Full textAlkahtani, Hend K. "Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/28120.
Full textKayahan, Hüseyin. "INTRUSION EXECUTION SYSTEMS : Prototype: IMPETUS." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29546.
Full textBooks on the topic "Information systems security policy"
NHS Management Executive. Information Management Group. Information systems security: Top level policy for the NHS. [Leeds]: NHS Management Executive, 1992.
Find full textHomeland security preparedness and information systems: Strategies for managing public policy. Hershey, PA: Information Science Reference, 2009.
Find full textWorkshop, on Integrity Policy in Computer Information Systems (1987 Waltham Mass ). Report of the invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS). Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1989.
Find full textNATO, Advanced Research Workshop on Future NATO Security (2003 Prague Czech Republic). Future NATO security: Addressing the challenges of evolving security and information sharing systems and architectures. Burke, VA: IOS Press, 2003.
Find full textMd.) National Information Systems Security Conference (20th 1997 Baltimore. 20th National Information Systems Security Conference: Final attendance list, October 7-10, 1997, Baltimore Convention Center, Baltimore, MD. Gaithersburg, MD: U.S. Department of Commerce, National Institute of Standards and Technology, 1997.
Find full textPolice information sharing: All-crimes approach to homeland security. El Paso, Tex: LFB Scholarly Pub., 2008.
Find full textCommerce, Canada Task Force on Electronic. A cryptography policy framework for electronic commerce: Building Canada's information economy and society. [Ottawa]: Task Force on Electronic Commerce, Industry Canada, 1998.
Find full textBrock, Jack L. Critical infrastructure protection: Comments on the national plan for information systems protection : statement for the record by Jack L. Brock, Jr., Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate. [Washington, D.C.]: The Office, 2000.
Find full textMeeting the need for inter-operability and information security in health IT: Hearing before the Committee on Science and Technology, House of Representatives, One Hundred Tenth Congress, first session, September 26, 2007. Washington: U.S. G.P.O., 2008.
Find full text1945-, Kramer Franklin D., Starr Stuart H, and Wentz Larry K, eds. Cyberpower and national security. Washington, D.C: Potomac Books, 2009.
Find full textBook chapters on the topic "Information systems security policy"
Rao, Y. Sreenivasa, and Ratna Dutta. "Recipient Anonymous Ciphertext-Policy Attribute Based Encryption." In Information Systems Security, 329–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_25.
Full textTelikicherla, Krishna Chaitanya, Venkatesh Choppella, and Bruhadeshwar Bezawada. "CORP: A Browser Policy to Mitigate Web Infiltration Attacks." In Information Systems Security, 277–97. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1_16.
Full textBatra, Gunjan, Vijayalakshmi Atluri, Jaideep Vaidya, and Shamik Sural. "Policy Reconciliation and Migration in Attribute Based Access Control." In Information Systems Security, 99–120. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36945-3_6.
Full textBera, P., S. K. Ghosh, and Pallab Dasgupta. "Formal Verification of Security Policy Implementations in Enterprise Networks." In Information Systems Security, 117–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6_10.
Full textCuppens, Frédéric, Nora Cuppens-Boulahia, and Céline Coma. "O2O: Virtual Private Organizations to Manage Security Policy Interoperability." In Information Systems Security, 101–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11961635_7.
Full textPadhya, Mukti, and Devesh Jinwala. "A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy." In Information Systems Security, 167–84. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13841-1_10.
Full textKrishnan, Ram, and Ravi Sandhu. "Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing." In Information Systems Security, 102–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25560-1_7.
Full textKoshley, Dileep Kumar, Sapana Rani, and Raju Halder. "Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage." In Information Systems Security, 68–87. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7_5.
Full textPathania, Amit, B. S. Radhika, and Rudrapatna Shyamasundar. "MySecPol: A Client-Side Policy Language for Safe and Secure Browsing." In Information Systems Security, 427–47. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_22.
Full textHachana, Safaà, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, and Stephane Morucci. "Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management." In Information Systems Security, 133–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45204-8_10.
Full textConference papers on the topic "Information systems security policy"
Tran, Trong Hieu, and Ngoc Thanh Nguyen. "Security Policy Integration Method for Information Systems." In 2009 First Asian Conference on Intelligent Information and Database Systems, ACIIDS. IEEE, 2009. http://dx.doi.org/10.1109/aciids.2009.14.
Full textYusufovna, Sattarova Feruza. "Advanced Security Policy Implementation for Information Systems." In 2008 International Symposium on Ubiquitous Multimedia Computing (UMC). IEEE, 2008. http://dx.doi.org/10.1109/umc.2008.56.
Full textThomas, Julien A., Nora Cuppens-Boulahia, and Frederic Cuppens. "Declassification Policy Management in Dynamic Information Systems." In 2011 Sixth International Conference on Availability, Reliability and Security (ARES). IEEE, 2011. http://dx.doi.org/10.1109/ares.2011.30.
Full textArmando, Alessandro, Gabriele Costa, Alessio Merlo, Luca Verderame, and Konrad Wrona. "Developing a NATO BYOD security policy." In 2016 International Conference on Military Communications and Information Systems (ICMCIS). IEEE, 2016. http://dx.doi.org/10.1109/icmcis.2016.7496587.
Full textArage, Tilahun Muluneh, and Tibebe Beshah Tesema. "An Integrated Approach to Information Systems Security Policy Violation." In the 10th International Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2908446.2908456.
Full textBhaharin, Surayahani Hasnul, Umi Asma' Mokhtar, Rossilawati Sulaiman, and Maryati Mohd Yusof. "Issues and Trends in Information Security Policy Compliance." In 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE, 2019. http://dx.doi.org/10.1109/icriis48246.2019.9073645.
Full textLi, Ling, Wu He, Li Xu, Ash Ivan, Mohd Anwar, and Xiaohong Yuan. "Does Explicit Information Security Policy Affect Employees' Cyber Security Behavior? A Pilot Study." In 2014 Enterprise Systems Conference (ES). IEEE, 2014. http://dx.doi.org/10.1109/es.2014.66.
Full textChen, Lanxiang, and Dan Feng. "Dynamic Security Policy for Credential-Based Storage Systems." In 2007 International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccit.2007.243.
Full textChen, Lanxiang, and Dan Feng. "Dynamic Security Policy for Credential-Based Storage Systems." In 2007 International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccit.2007.4420414.
Full textGalego, Nuno Miguel Carvalho, Rui Miguel Pascoal, and Pedro Ramos Brandao. "BYOD : Impact in Architecture and Information Security Corporate Policy." In 2022 17th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2022. http://dx.doi.org/10.23919/cisti54924.2022.9820043.
Full textReports on the topic "Information systems security policy"
Kim, Jae-Jin, Hyoeun Kim, Sewon Kim, and Gerardo Reyes-Tagle. A Roadmap for Digitalization of Tax Systems: Lessons from Korea. Inter-American Development Bank, April 2022. http://dx.doi.org/10.18235/0004195.
Full textErkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.
Full textIrvine, Cynthia E., and Michael F. Thompson. Expressing an Information Security Policy Within A Security Simulation Game. Fort Belvoir, VA: Defense Technical Information Center, July 2004. http://dx.doi.org/10.21236/ada435316.
Full textAxline, R. M. Jr, and R. C. Ormesher. Security policy concepts for microprocessor-based systems. Office of Scientific and Technical Information (OSTI), March 1989. http://dx.doi.org/10.2172/6138632.
Full textYeo, Tat S., and Xudong Chen. Establishing Information Security Systems via Optical Imaging. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada623481.
Full textGrance, T., J. Hash, S. Peck, J. Smith, and K. Korow-Diks. Security guide for interconnecting information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-47.
Full textSwanson, M., N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.
Full textDEPARTMENT OF DEFENSE WASHINGTON DC. Security and Policy Review of DoD Information for Public Release. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada530470.
Full textMcIntyre, H. Security and Policy Review of DoD Information for Public Release,. Fort Belvoir, VA: Defense Technical Information Center, May 1996. http://dx.doi.org/10.21236/ada310835.
Full textDempsey, K. L., N. S. Chawla, L. A. Johnson, R. Johnston, A. C. Jones, A. D. Orebaugh, M. A. Scholl, and K. M. Stine. Information Security Continuous Monitoring (ISCM) for federal information systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-137.
Full text