Information Security Policy: Relevance, Creation and Enforcement
dc.contributor.author | Jegede, Abayomi Joshau | |
dc.contributor.author | Aimufua, Gilbert Imuetinyan Osaze | |
dc.date.accessioned | 2023-12-14T07:04:48Z | |
dc.date.available | 2023-12-14T07:04:48Z | |
dc.date.issued | 2007-01-06 | |
dc.description.abstract | Electronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The power and convenience of infonnation technology is, however, counterbalanced by the wide range of threats to the security of electronic infonnation. Tins study explores the concept and relevance of security as it relates to electronic information systems. It also sets out the background to preparing an infonnation security policy as well as the strategies required for implementing and enforcing such policy. | en_US |
dc.identifier.citation | Aimufua, G.I.O. & Jegede A.J. (2007) Information Security Policy: Relevance, Creation and Enforcement | en_US |
dc.identifier.uri | https://keffi.nsuk.edu.ng/handle/20.500.14448/5562 | |
dc.language.iso | en | en_US |
dc.publisher | Department of Computer Science, Nasarawa State University Keffi | en_US |
dc.subject | Auditing, enforcement, information, information security, security, security policy | en_US |
dc.title | Information Security Policy: Relevance, Creation and Enforcement | en_US |
dc.type | Article | en_US |