Publication
Deļ¬nition of information systems security policies
dc.contributor.author | Lopes, Isabel Maria | |
dc.contributor.author | Pereira, João Paulo | |
dc.contributor.author | Oliveira, Pedro | |
dc.date.accessioned | 2017-05-08T11:12:56Z | |
dc.date.available | 2017-05-08T11:12:56Z | |
dc.date.issued | 2017 | |
dc.description.abstract | Information is considered to be the most critical asset in the business world and the management of the risks associated with information must become a pattern practice within the companies [1]. Therefore, the adoption of an Information Systems Security (ISS) policy for the protection of such an asset makes total sense. Organizations handle increasingly larger amounts of information in technological supports, which makes continuously stricter and broader security controls indispensable. The technological process may work as a catalyst for threats but is not alone enough to ensure the eļ¬ective security of information. Just as if not more important than reaching the appropriate levels of information security within each organization is being able to maintain them. Having software and hardware which contributes to the security of information is not enough. Organizations must also have a security policy and a good security management so as to ļ¬rmly anchor the eļ¬orts to protect the assets of the information system [2]. In order to better understand the concept of ISS policy, it is convenient to distinguish it from concepts such as norms, directives and procedures. Table 1 shows the diļ¬erences between these concepts. | pt_PT |
dc.description.version | info:eu-repo/semantics/publishedVersion | pt_PT |
dc.identifier.citation | Lopes, Isabel Maria; Pereira, JoĆ£o Paulo; Oliveira, P.(2017) - Deļ¬nition of information systems security policie. In Rocha Ć. [et al.] (eds) Recent Advances in Information Systems and Technologies. Springer International Publishing. vol 571, p. 225-234. ISBN 978-3-319-56540-8 | pt_PT |
dc.identifier.doi | 10.1007/978-3-319-56541-5_23 | pt_PT |
dc.identifier.isbn | 978-3-319-56540-8 | |
dc.identifier.uri | http://hdl.handle.net/10198/14259 | |
dc.language.iso | eng | pt_PT |
dc.peerreviewed | yes | pt_PT |
dc.publisher | Springer International Publishing | pt_PT |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | pt_PT |
dc.subject | Information security | pt_PT |
dc.subject | Deļ¬nition of security policies | pt_PT |
dc.subject | Information systems security policies | pt_PT |
dc.title | Deļ¬nition of information systems security policies | pt_PT |
dc.type | conference object | |
dspace.entity.type | Publication | |
oaire.citation.conferencePlace | Porto Santo, Madeira, Portugal | pt_PT |
oaire.citation.endPage | 234 | pt_PT |
oaire.citation.startPage | 225 | pt_PT |
oaire.citation.title | Recent Advances in Information Systems and Technologies | pt_PT |
oaire.citation.volume | 571 | pt_PT |
person.familyName | Lopes | |
person.familyName | Pereira | |
person.familyName | Oliveira | |
person.givenName | Isabel Maria | |
person.givenName | João Paulo | |
person.givenName | Pedro | |
person.identifier.ciencia-id | 8812-AE1C-A316 | |
person.identifier.ciencia-id | 8916-6CB8-AEB1 | |
person.identifier.orcid | 0000-0002-5614-3516 | |
person.identifier.orcid | 0000-0001-9259-0308 | |
person.identifier.orcid | 0000-0001-8346-1694 | |
person.identifier.rid | A-1728-2014 | |
person.identifier.rid | M-8214-2013 | |
person.identifier.scopus-author-id | 55211017300 | |
person.identifier.scopus-author-id | 23135900800 | |
rcaap.rights | restrictedAccess | pt_PT |
rcaap.type | conferenceObject | pt_PT |
relation.isAuthorOfPublication | 111716db-94a0-4c24-b739-330dc2ae79fc | |
relation.isAuthorOfPublication | 55b6262f-9aaf-4fd0-8e83-e858a2a92402 | |
relation.isAuthorOfPublication | b2d880bb-278b-489c-aa8f-353cfd99f0fa | |
relation.isAuthorOfPublication.latestForDiscovery | 55b6262f-9aaf-4fd0-8e83-e858a2a92402 |