This study originated from the realisation that the information security industry has identified the information security policy as one of the most important information security management controls. Within the industry there are, however, differing views as to what constitutes an information security policy, what it should contain, how it should be developed and how it should best be disseminated and managed. Numerous organisations claim to have an information security policy, but admit that it is not an effective control. The principal aim of this study is to make a contribution to the information security discipline by defining what an information security policy is, where it fits into the broader information security management framewor...
Information security has become a much discussed subject all over the world in the last few years. T...
Information security has become a much discussed subject all over the world in the last few years. T...
A security policy which includes the appropriate phases of implementation, enforcement, auditing and...
This study originated from the realisation that the information security industry has identified the...
This thesis aims to have an overview of the current studies in the development of information securi...
Abstract. Information security has begun to receive an increasing amount of intention. The importanc...
Information security policy is essential to the success of any information security program because ...
This report is a bachelor thesis created for the Technology Center as a part of the Software Enginee...
An organizational information security policy (InfoSec policy) is a directiongiving instrument for i...
Among information security controls, the literature gives a central role to information security pol...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Among information security controls, the literature gives a central role to information security pol...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Completed research paperAmong information security controls, the literature gives a central role to ...
The corporate scandals of the last few years have changed the face of information security and its g...
Information security has become a much discussed subject all over the world in the last few years. T...
Information security has become a much discussed subject all over the world in the last few years. T...
A security policy which includes the appropriate phases of implementation, enforcement, auditing and...
This study originated from the realisation that the information security industry has identified the...
This thesis aims to have an overview of the current studies in the development of information securi...
Abstract. Information security has begun to receive an increasing amount of intention. The importanc...
Information security policy is essential to the success of any information security program because ...
This report is a bachelor thesis created for the Technology Center as a part of the Software Enginee...
An organizational information security policy (InfoSec policy) is a directiongiving instrument for i...
Among information security controls, the literature gives a central role to information security pol...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Among information security controls, the literature gives a central role to information security pol...
Despite its widely acknowledged importance, the information security policy has not, to date, been t...
Completed research paperAmong information security controls, the literature gives a central role to ...
The corporate scandals of the last few years have changed the face of information security and its g...
Information security has become a much discussed subject all over the world in the last few years. T...
Information security has become a much discussed subject all over the world in the last few years. T...
A security policy which includes the appropriate phases of implementation, enforcement, auditing and...