The security policy application process: Action research

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is crucial for companies to acknowledge the need for applying security policies because, without such policies, there is no reliable way to define, implement, and enforce a security plan within an organization. Small and medium sized enterprises (SME) are no exception. Within the organizational universe, SMEs assume a unique relevance due to their high number, which makes information security efficiency a paramount issue. There are several measures which can be implemented in order to ensure the effective protection of information assets, among which the adoption of ISS policies stands out. A recent survey concluded that from 307 SMEs, only 15 indicated to have an ISS policy [1]. The conclusion drawn from that study was that the adoption of ISS policies has not become a reality yet. As an attempt to mitigate this fact, security policies were formulated, implemented and adopted in 10 SMEs which had stated not to have this security measure. These interventions were conceived as Action Research (AR) projects.

Cite

CITATION STYLE

APA

Lopes, I., & Oliveira, P. (2016). The security policy application process: Action research. In Advances in Intelligent Systems and Computing (Vol. 445, pp. 353–362). Springer Verlag. https://doi.org/10.1007/978-3-319-31307-8_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free