Item request has been placed!
×
Item request cannot be made.
×
![loading](/sites/all/modules/hf_eds/images/loading.gif)
Processing Request
Information Security Policy Development and Implementation.
Item request has been placed!
×
Item request cannot be made.
×
![loading](/sites/all/modules/hf_eds/images/loading.gif)
Processing Request
- المؤلفون: Kadam, Avinash W.
- المصدر:
Information Systems Security. Sep/Oct2007, Vol. 16 Issue 5, p246-256. 11p. 5 Charts.
- معلومة اضافية
- الموضوع:
- نبذة مختصرة :
Development of the information security policy is a critical activity. Credibility of the entire information security program of an organization depends upon a well-drafted information security policy. Most of the stakeholders do not have time or inclination to wade through a lengthy policy document. This article tries to formulate an approach to the information security policy development that will make the policy document capture the essentials of information security as applicable to a business. The document will also convey the urgency and importance of implementing the policy, not only in letter but also in spirit. [ABSTRACT FROM AUTHOR]
- نبذة مختصرة :
Copyright of Information Systems Security is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
No Comments.