Repository logo
 
Publication

Definition of information systems security policies

dc.contributor.authorLopes, Isabel Maria
dc.contributor.authorPereira, João Paulo
dc.contributor.authorOliveira, Pedro
dc.date.accessioned2017-05-08T11:12:56Z
dc.date.available2017-05-08T11:12:56Z
dc.date.issued2017
dc.description.abstractInformation is considered to be the most critical asset in the business world and the management of the risks associated with information must become a pattern practice within the companies [1]. Therefore, the adoption of an Information Systems Security (ISS) policy for the protection of such an asset makes total sense. Organizations handle increasingly larger amounts of information in technological supports, which makes continuously stricter and broader security controls indispensable. The technological process may work as a catalyst for threats but is not alone enough to ensure the effective security of information. Just as if not more important than reaching the appropriate levels of information security within each organization is being able to maintain them. Having software and hardware which contributes to the security of information is not enough. Organizations must also have a security policy and a good security management so as to firmly anchor the efforts to protect the assets of the information system [2]. In order to better understand the concept of ISS policy, it is convenient to distinguish it from concepts such as norms, directives and procedures. Table 1 shows the differences between these concepts.pt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.citationLopes, Isabel Maria; Pereira, João Paulo; Oliveira, P.(2017) - Definition of information systems security policie. In Rocha Á. [et al.] (eds) Recent Advances in Information Systems and Technologies. Springer International Publishing. vol 571, p. 225-234. ISBN 978-3-319-56540-8pt_PT
dc.identifier.doi10.1007/978-3-319-56541-5_23pt_PT
dc.identifier.isbn978-3-319-56540-8
dc.identifier.urihttp://hdl.handle.net/10198/14259
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.publisherSpringer International Publishingpt_PT
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt_PT
dc.subjectInformation securitypt_PT
dc.subjectDefinition of security policiespt_PT
dc.subjectInformation systems security policiespt_PT
dc.titleDefinition of information systems security policiespt_PT
dc.typeconference object
dspace.entity.typePublication
oaire.citation.conferencePlacePorto Santo, Madeira, Portugalpt_PT
oaire.citation.endPage234pt_PT
oaire.citation.startPage225pt_PT
oaire.citation.titleRecent Advances in Information Systems and Technologiespt_PT
oaire.citation.volume571pt_PT
person.familyNameLopes
person.familyNamePereira
person.familyNameOliveira
person.givenNameIsabel Maria
person.givenNameJoão Paulo
person.givenNamePedro
person.identifier.ciencia-id8812-AE1C-A316
person.identifier.ciencia-id8916-6CB8-AEB1
person.identifier.orcid0000-0002-5614-3516
person.identifier.orcid0000-0001-9259-0308
person.identifier.orcid0000-0001-8346-1694
person.identifier.ridA-1728-2014
person.identifier.ridM-8214-2013
person.identifier.scopus-author-id55211017300
person.identifier.scopus-author-id23135900800
rcaap.rightsrestrictedAccesspt_PT
rcaap.typeconferenceObjectpt_PT
relation.isAuthorOfPublication111716db-94a0-4c24-b739-330dc2ae79fc
relation.isAuthorOfPublication55b6262f-9aaf-4fd0-8e83-e858a2a92402
relation.isAuthorOfPublicationb2d880bb-278b-489c-aa8f-353cfd99f0fa
relation.isAuthorOfPublication.latestForDiscovery55b6262f-9aaf-4fd0-8e83-e858a2a92402

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Capa e artigo.pdf
Size:
8 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: