Journal of Management Information Systems
Security in computing
The process of network security: designing and managing a safe network
The process of network security: designing and managing a safe network
Policies for Construction of Information Systems' Security Guidelines: Five Approaches
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
PFIRES: a policy framework for information security
Communications of the ACM - A game experience in every application
Why there aren't more information security research studies
Information and Management
Measuring the value of information: the information-intensive organization
IBM Systems Journal
Information systems security: Scope, state-of-the-art, and evaluation of techniques
International Journal of Information Management: The Journal for Information Professionals
Risks in the use of information technology within organizations
International Journal of Information Management: The Journal for Information Professionals
In defense of the realm: understanding the threats to information security
International Journal of Information Management: The Journal for Information Professionals
Special Section: Guest Editorial: the challenge of managing information security
International Journal of Information Management: The Journal for Information Professionals
Feature: What Makes an Effective Information Security Policy?
Network Security
Metrics for characterizing the form of security policies
The Journal of Strategic Information Systems
Managing a security program in a cloud computing environment
2009 Information Security Curriculum Development Conference
International Journal of Information Management: The Journal for Information Professionals
The information security policy unpacked: A critical study of the content of university policies
International Journal of Information Management: The Journal for Information Professionals
Information Resources Management Journal
Hi-index | 0.00 |
Information is a critical corporate asset that has become increasingly vulnerable to attacks from viruses, hackers, criminals, and human error. Consequently, organizations are having to prioritize the security of their computer systems in order to ensure that their information assets retain their accuracy, confidentiality, and availability. While the importance of the information security policy InSPy in ensuring the security of information is acknowledged widely, to date there has been little empirical analysis of its impact or effectiveness in this role. To help fill this gap, an exploratory study was initiated that sought to investigate the relationship between the uptake and application of information security policies and the accompanying levels of security breaches. To this end, a questionnaire was designed, validated, and then targeted at IT managers within large organizations in the UK. The findings presented in this paper are somewhat surprising, as they show no statistically significant relationships between the adoption of information security policies and the incidence or severity of security breaches. The paper concludes by exploring the possible interpretations of this unexpected finding and its implications for the practice of information security management.