Development of organizational internet security policy: a holistic approach

Lichtenstein, Sharman 2005, Development of organizational internet security policy: a holistic approach. In Chen, William W.S. (ed), Statistical methods in computer security, Marcel Dekker, New York, N.Y., pp.1-21.

Attached Files
Name Description MIMEType Size Downloads

Title Development of organizational internet security policy: a holistic approach
Author(s) Lichtenstein, Sharman
Title of book Statistical methods in computer security
Editor(s) Chen, William W.S.
Publication date 2005
Series Statistics : textbooks and monographs ; v. 177
Total chapters 19
Start page 1
End page 21
Total pages 21
Publisher Marcel Dekker
Place of Publication New York, N.Y.
Summary This chapter describes a general framework for developing organizational internet security policy. A model of internet security risks for an internet user organization is proposed. The framework utilizes this model, as well as a holistic approach, to develop the organization's internet security policy. A hierarchy of sub-policies for the internet security policy is also suggested. This chapter presents findings from part of a wider investigation into internet security policy.
ISBN 9780824759391
Language eng
Field of Research 080609 Information Systems Management
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
Copyright notice ©2000, Marcel Dekker
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 550 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Thu, 03 Jul 2008, 11:10:33 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact