Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3958
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kurtel, Kaan | - |
dc.date.accessioned | 2023-06-16T15:06:30Z | - |
dc.date.available | 2023-06-16T15:06:30Z | - |
dc.date.issued | 2008 | - |
dc.identifier.isbn | 9.78143E+12 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3958 | - |
dc.description | Gazimagusa Teknopark, TRNC;Ministry of Education and Culture, TRNC;North Cyprus Turkcell, TRNC | en_US |
dc.description | 1st International Conference on Security of Information and Networks, SIN 2007 -- 7 May 2007 through 10 May 2007 -- Gazimagusa -- 103950 | en_US |
dc.description.abstract | Emerging trends increase the role of security in modern business life. Thus, the role of security policy has become more significant. An information security policy defines the firm's security requirements also minimizes security risks. This objective is simply realized by good collaboration between the security policy and the existing cryptographic technologies. This paper includes a descriptive and analytical understanding of the role of information security services for developing security policy; in addition, the study also explains some details of possible effects an electronic document related to this concept. Security policy developers are the main beneficiaries of this work. © 2008 Atilla Elçi. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Tafford Publishing | en_US |
dc.relation.ispartof | Security of Information and Networks - Proceedings of the 1st International Conference on Security of Information and Networks, SIN 2007 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | And E-business | en_US |
dc.subject | Information security policy | en_US |
dc.subject | Security of data | en_US |
dc.subject | Security systems | en_US |
dc.subject | And E-business | en_US |
dc.subject | Business life | en_US |
dc.subject | CryptoGraphics | en_US |
dc.subject | Emerging trends | en_US |
dc.subject | Information security policies | en_US |
dc.subject | Security policy | en_US |
dc.subject | Security requirements | en_US |
dc.subject | Security risks | en_US |
dc.subject | Security services | en_US |
dc.subject | Technological components | en_US |
dc.subject | Electronic commerce | en_US |
dc.title | Information security policy: Positioning the technological components of information security services under the perspective of electronic business | en_US |
dc.type | Conference Object | en_US |
dc.identifier.scopus | 2-s2.0-84893158192 | en_US |
dc.authorscopusid | 37107875500 | - |
dc.identifier.startpage | 302 | en_US |
dc.identifier.endpage | 307 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 05.04. Software Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2985.pdf Restricted Access | 38.35 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
2
checked on Nov 20, 2024
Page view(s)
56
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.