Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Information Security Policy

Handbook of Research on Public Information Technology
This is a document that outlines the rules, laws, and practices that regulate how an organization will manage, protect, and distribute its sensitive information (both corporate and client information). It lays the framework for the computer-network-oriented security of an organization.
Published in Chapter:
Implementing a Sound Public Information Security Program
Stephen K. Aikins (University of South Florida, USA)
Copyright: © 2008 |Pages: 10
DOI: 10.4018/978-1-59904-857-4.ch062
Abstract
The evolving nature of information security threats such as cybercrime, as well as the need to ensure the confidentiality and privacy of citizen information and to protect critical infrastructure call for effective information security management in the public sector. According to Evers (2006), the FBI (Federal Bureau of Investigation) estimates that cybercrime will cost businesses an estimated $67.2 billion per year. Citizens’ privacy and the security of their personal information have become issues of increasing concern as headlines of data security breaches and identity thefts abound in the mainstream media. For example, in 2005, 9.3 million U.S. citizens, about 4.25% of the population, were victims of identity theft and fraud, costing approximately $54.4 billion (Council of Better Business & Javelin Strategy & Research, 2006). E-government applications have made it easier for citizens to conduct business online with government agencies, although their trust in the ability of governments to keep that information private is low. Considering the amount of citizen information held by governments at all levels and the steps needed to address potential homeland-security and IT-related threats to critical infrastructure, the need for effective means of safeguarding public agency data has become an issue of paramount importance. In addition, the need to ensure integrity and availability of public information resources is crucial to many government operations. As a result, several states are recognizing the importance of information security and privacy in their state IT strategic plans (National Association of State Chief Information Security Officers [NASCIO], 2006).
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Rapid E-Learning in the University
A document which outlines the basic rules of safe processing and dissemination of information.
Full Text Chapter Download: US $37.50 Add to Cart
Designing an Effective Information Security Policy for Public Organizations: ISO 27001 as a Success Framework
Is a written, living document outlining the actions and procedures that employees should follow in order to protect an organization’s information security assets, an information security policy outlines the function and tasks of employees in order to protect an organization's information assets.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policies
A comprehensive set of controls comprising best practices in information security. It is a plan or code of practice for information security management embracing the principles for initiating, implementing, maintaining and improving information security in an organization.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Policy in Large Public Organizations: A Case Study Through ISO 27002
A written, living document outlining the actions and procedures that employees should follow in order to protect an organization’s information security assets, an information security policy outlines the function and tasks of employees in order to protect an organization's information assets.
Full Text Chapter Download: US $37.50 Add to Cart
Can Total Quality Management Exist in Cyber Security: Is It Present? Are We Safe?
Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability).
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR