Information Security Policy: Relevance, Creation and Enforcement

dc.contributor.authorJegede, Abayomi Joshau
dc.contributor.authorAimufua, Gilbert Imuetinyan Osaze
dc.date.accessioned2023-12-14T07:04:48Z
dc.date.available2023-12-14T07:04:48Z
dc.date.issued2007-01-06
dc.description.abstractElectronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The power and convenience of infonnation technology is, however, counterbalanced by the wide range of threats to the security of electronic infonnation. Tins study explores the concept and relevance of security as it relates to electronic information systems. It also sets out the background to preparing an infonnation security policy as well as the strategies required for implementing and enforcing such policy.en_US
dc.identifier.citationAimufua, G.I.O. & Jegede A.J. (2007) Information Security Policy: Relevance, Creation and Enforcementen_US
dc.identifier.urihttps://keffi.nsuk.edu.ng/handle/20.500.14448/5562
dc.language.isoenen_US
dc.publisherDepartment of Computer Science, Nasarawa State University Keffien_US
dc.subjectAuditing, enforcement, information, information security, security, security policyen_US
dc.titleInformation Security Policy: Relevance, Creation and Enforcementen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
9. (2007).pdf
Size:
483.07 KB
Format:
Adobe Portable Document Format
Description:
Article
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Plain Text
Description:

Collections