Information security policy compliance model in organizations (original) (raw)

Profile image of Nader Sohrabi SafaNader Sohrabi Safa

2016, Computers & Security

visibility

description

13 pages

link

1 file

Information security management standards: Compliance, governance and risk management

Edward Humphreys

Information Security Technical Report, 2008

View PDFchevron_right

Information Assurance

David Tipper

Information Assurance, 2008

View PDFchevron_right

Information Security Policies

Jatinder N.d Gupta

Handbook of Research on Information Security and Assurance

View PDFchevron_right

IT Security Governance Legal Issues

Gemma Minero Alejandre

Theory and Research

View PDFchevron_right

A Compliance Aware Infrastructure as a Service

Shakil Khan

Services Transactions on Services Computing, 2014

View PDFchevron_right

A Generic Framework for Information Security Policy Development

Setyawan Widyarto

Proceeding of the Electrical Engineering Computer Science and Informatics, 2017

View PDFchevron_right

Information Security Awareness: An Innovation Approach

Carlos Orozco Corona

Egham, England: Department of Mathematics, Royal …, 2009

View PDFchevron_right

Professionalism, Organizations, and Compliance

Valerie Braithwaite

Law <html_ent glyph="@amp;" ascii="&amp;"/> Social Inquiry, 1993

View PDFchevron_right

Access to Data and Employee Actions for Information Security

Justyna Żywiołek

Sciendo eBooks, 2019

View PDFchevron_right

A Comprehensive Approach to Compliance Management in Inter-organizational Service Integration Platforms

Raul Ruggia

Proceedings of the 13th International Conference on Software Technologies, 2018

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Implementation of Information Security in the EU Information Systems

Ingrid Pappel

Lecture Notes in Computer Science, 2018

View PDFchevron_right

Modelling and Deploying Security Policies

Ruben Parra Alonso

Proceedings of the Fifth International Conference on Web Information Systems and Technologies, 2009

View PDFchevron_right

The Policy Machine for Security Policy Management

David Ferraiolo

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Selected aspects of information security management in Voivodeship Office in Poland

Maciej Szmit

Securitologia, 2014

View PDFchevron_right

Policy Note

Daniel Friesner

Journal of Economic Issues, 2014

View PDFchevron_right

Factors Contributing to the Success of Information Security Management Implementation

mazlina zammani

International Journal of Advanced Computer Science and Applications, 2019

View PDFchevron_right

Compliance aware business process design

Shazia Sadiq

Business Process Management …, 2008

View PDFchevron_right

Enterprise Architecture and Security Architecture Development

shahram jalaliniya

2011

View PDFchevron_right

3. Integration policies

Raivo Vetik

The Russian Second Generation in Tallinn and Kohtla-Järve, 2011

View PDFchevron_right

Journal of Information Systems and Technology Management

Jacir Favretto

View PDFchevron_right

Policy Advice

Klaus Zimmermann

2014

View PDFchevron_right

Executive Information Systems

Ruben Xing

IGI Global eBooks, 2011

View PDFchevron_right

Planning organizational security

Susan Lincke

Proceedings of the 13th annual conference on Information technology education - SIGITE '12, 2012

View PDFchevron_right

A Composite Framework for Behavioral Compliance with Information Security Policies

Raymond Panko

2012

View PDFchevron_right

Digital Business Security Development

Don Kerr

2011

View PDFchevron_right

Building an information security education program

Merrill Warkentin

Proceedings of the 1st annual conference on Information security curriculum development - InfoSecCD '04, 2004

View PDFchevron_right

Security of Information and Communication Technologies

Zoran Cekerevac

FBIM Transactions, 2019

View PDFchevron_right

Research and Information Service Research Paper

Des McKibbin

2012

View PDFchevron_right

Systems, software and services process improvement

Alexander Poth

Computer Standards & Interfaces, 2013

View PDFchevron_right

Business & Information Systems Engineering

Peter Zencke

View PDFchevron_right

International Working Group on Assurance Cases (for Security)

Sofia Guerra

IEEE Security & Privacy Magazine, 2006

View PDFchevron_right

Governing global information and communications policy

Derrick Cogburn

Telecommunications Policy, 2003

View PDFchevron_right

Development of ISEE: An information security engineering environment

ahmad iqbal

Proceedings - 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, 2009

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Security Projects for Systems and Networking Professionals

Hamid Arabnia

Emerging Trends in ICT Security, 2014

View PDFchevron_right

BusinessComputer ScienceInformation SecurityInformation Security ManagementComputers SecurityHuman Aspects of Information Sec...