Abstract
This paper reports on findings from current research into the development of Information Security Policies within Organisations. The work highlights the key issues that influence the development of policies, procedures and information systems, in the context of information security provision. Going further, it identifies aspects of current practice in Information Security Policy Development that challenge the success and long-term viability of organisational processes for identifying, designing and implementing appropriate and sufficient protection measures. This information is then used to make recommendations for organisations attempting to develop their own effective policies.
Chapter PDF
References
Hugo Cornwall, Datatheft’, Heinemann, 1987
Chris Edwards et al, ‘Information Technology and the Law’, 2nd edition, Macmillan, 1990
Martin Smith, ‘Commonsense Computer Security’, 2nd edition, McGraw-Hill, 1993
Adrian R. Warman, ‘Organisational Computer Security Policies’, London School of Economics Working Paper, Department of Information Systems, July 1991
Adrian R. Warman, ‘Organisational Computer Security Policies: The Reality’, European Journal of Information Systems, Vol. 1, No. 5, pp 305–310, 1992.
James Stoner et al, Management’, 4th edition, Prentice-Hall, 1989
Andy Reinhardt, ‘Building the Data Highway’, Byte Magazine, March 1994
Tom Peters, ‘Thriving on Chaos: Handbook for a Management Revolution’, Pan, 1987
Odd de Presno, ‘The Online World’, version 1.6, July 1994. This is an electronic book, for further information contact Odd de Presno on opresno@extern.uio.no or presno@grida.no
United States General Accounting Office, ‘Computer Security: Government Planning Process Had Limited Impact’, Report to the Chairman, Committee on Science, Space, and Technology, House of Representatives, GAO/IMTEC-90-48, 10 May 1990
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Warman, A.R. (1995). Developing Policies, Procedures and Information Security Systems. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_35
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_35
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive