dc.contributor.author | Fong, Norman | |
dc.contributor.author | Bayona-Oré, Sussy | |
dc.date.accessioned | 2024-08-08T17:00:07Z | |
dc.date.available | 2024-08-08T17:00:07Z | |
dc.date.issued | 2023 | |
dc.identifier.uri | https://hdl.handle.net/20.500.13067/3310 | |
dc.description.abstract | With the incorporation of Information and Communication Technologies in organizations, Information Security is key to protect the organization's information assets. The purposes and objectives of the organization related to Information Security are set out in the Information Security Policy document, which are mandatory for the employee to comply with. However, despite the efforts made by the organizations to comply with them, this objective is not always achieved. In response, several authors have proposed practices to be followed in order to ensure compliance with Information Security Policies. This article presents a proposal for the integration of the practices identified in the literature review. These practices have been structured in four phases related to: the establishment of the Information Security Committee, considerations in the elaboration of an Information Security Policy, on the communication of information security policies and the evaluation of security performance. Also, a survey was conducted to evaluate the compliance of ISP. A total of 108 security professional participated in the survey. Consideration of good practices supports the deployment and monitoring of Information Security Policy compliance. | es_PE |
dc.format | application/pdf | es_PE |
dc.language.iso | eng | es_PE |
dc.publisher | Machine Intelligence Research (MIR) Labs | es_PE |
dc.rights | info:eu-repo/semantics/openAccess | es_PE |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-sa/4.0/ | es_PE |
dc.source | AUTONOMA | es_PE |
dc.subject | Compliance | es_PE |
dc.subject | Information security | es_PE |
dc.subject | Information security policies | es_PE |
dc.subject | ISO 27001 | es_PE |
dc.subject | ISO 27002 | es_PE |
dc.title | Integration of Practices for Information Security Policy Compliance | es_PE |
dc.type | info:eu-repo/semantics/article | es_PE |
dc.identifier.journal | International Journal of Computer Information Systems and Industrial Management Applications | es_PE |
dc.subject.ocde | https://purl.org/pe-repo/ocde/ford#2.02.04 | es_PE |
dc.source.volume | 16 | es_PE |
dc.source.issue | 1 | es_PE |
dc.source.beginpage | 30 | es_PE |
dc.source.endpage | 39 | es_PE |