Reinforcing the security of corporate information resources: A critical review of the role of the acceptable use policy.
Neil F. DohertyLeonidas AnastasakisHeather FulfordPublished in: Int. J. Inf. Manag. (2011)
Keyphrases
- information resources
- digital libraries
- information management
- metadata
- information sharing
- information security
- distributed environment
- enterprise wide
- case study
- information seeking
- information services
- directory service
- topic maps
- network security
- optimal policy
- access control
- knowledge management
- information providers
- security policies
- intrusion detection
- networked environment
- databases
- policy enforcement
- role based access control
- personal information
- expert systems
- website
- decision making