Repository logo
 
Publication

The security policy application process: action research

dc.contributor.authorLopes, Isabel Maria
dc.contributor.authorOliveira, Pedro
dc.date.accessioned2016-03-31T08:44:45Z
dc.date.available2016-03-31T08:44:45Z
dc.date.issued2016
dc.description.abstractIt is crucial for companies to acknowledge the need for applying security policies because, without such policies, there is no reliable way to define, implement, and enforce a security plan within an organization. Small and medium sized enterprises (SME) are no exception. Within the organizational universe, SMEs assume a unique relevance due to their high number, which makes information security efficiency a paramount issue. There are several measures which can be implemented in order to ensure the effective protection of information assets, among which the adoption of ISS policies stands out. A recent survey concluded that from 307 SMEs, only 15 indicated to have an ISS policy [1]. The conclusion drawn from that study was that the adoption of ISS policies has not become a reality yet. As an attempt to mitigate this fact, security policies were formulated, implemented and adopted in 10 SMEs which had stated not to have this security measure. These interventions were conceived as Action Research (AR) projects.pt_PT
dc.description.sponsorshipThis work has been supported by FCT- Fundação para a Ciência e a Teconologia within the Project Scope UID/CEC/00319/2013.
dc.identifier.citationLopes, Isabel Maria; Oliveira P. (2016). The security policy application process: action research. In Rocha, Álvaro [et al.] (eds.) New Advances in Information Systems and Tecnologies. London: Springer International Publishing. 2, p. 353-362. ISBN 978-3-319-31307-8pt_PT
dc.identifier.doi10.1007/978-3-319-31307-8_37pt_PT
dc.identifier.isbn978-3-319-31307-8
dc.identifier.issn2194-5357
dc.identifier.urihttp://hdl.handle.net/10198/12855
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.publisherSpringer International Publishingpt_PT
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt_PT
dc.subjectFormulation Implementation and adoption of information security policiespt_PT
dc.subjectInformation securitypt_PT
dc.subjectSmall and medium sized enterprisespt_PT
dc.titleThe security policy application process: action researchpt_PT
dc.typeconference paper
dspace.entity.typePublication
oaire.awardURIinfo:eu-repo/grantAgreement/FCT/5876/UID%2FCEC%2F00319%2F2013/PT
oaire.citation.conferencePlaceSpringer Internatonal Publishingpt_PT
oaire.citation.endPage362pt_PT
oaire.citation.startPage353pt_PT
oaire.citation.titleNew Advances in Information Systems and Tecnologiespt_PT
oaire.citation.volume2pt_PT
oaire.fundingStream5876
person.familyNameLopes
person.familyNameOliveira
person.givenNameIsabel Maria
person.givenNamePedro
person.identifier.ciencia-id8812-AE1C-A316
person.identifier.orcid0000-0002-5614-3516
person.identifier.orcid0000-0001-8346-1694
person.identifier.ridA-1728-2014
person.identifier.scopus-author-id55211017300
project.funder.identifierhttp://doi.org/10.13039/501100001871
project.funder.nameFundação para a Ciência e a Tecnologia
rcaap.rightsrestrictedAccesspt_PT
rcaap.typeconferenceObjectpt_PT
relation.isAuthorOfPublication111716db-94a0-4c24-b739-330dc2ae79fc
relation.isAuthorOfPublicationb2d880bb-278b-489c-aa8f-353cfd99f0fa
relation.isAuthorOfPublication.latestForDiscovery111716db-94a0-4c24-b739-330dc2ae79fc
relation.isProjectOfPublication00c39a26-0b76-46f3-8cf2-257e31150f09
relation.isProjectOfPublication.latestForDiscovery00c39a26-0b76-46f3-8cf2-257e31150f09

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
New+Advances+in+Information+Systems+and+VOL 2.pdf
Size:
215.97 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: