Information Security Policies: A Content Analysis
نویسندگان
چکیده
Among information security controls, the literature gives a central role to information security policies. However, there is a reduced number of empirical studies about the features and components of information security policies. This research aims to contribute to fill this gap. It presents a synthesis of the literature on information security policies content and it characterizes 25 City Councils information security policy documents in terms of features and components. The content analysis research technique was employed to characterize the information security policies. The profile of the policies is presented and discussed and propositions for future work are suggested.
منابع مشابه
Identifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملGender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملGender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملContent, Context, Process Analysis of IS Security Policy Formation
Security management is now acknowledged as a key constituent of Information Systems (IS) management. IS security management traditionally relies on the formation and application of security policies. Most of the research in this field address issues regarding the structure and content of security policies; whereas the context within which security policies are conceived and developed remains ra...
متن کاملThe information security policy unpacked: A critical study of the content of university policies
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as Universities, as the effective conduct of their core teaching and research activities is ...
متن کامل