Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/3958
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKurtel, Kaan-
dc.date.accessioned2023-06-16T15:06:30Z-
dc.date.available2023-06-16T15:06:30Z-
dc.date.issued2008-
dc.identifier.isbn9.78143E+12-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/3958-
dc.descriptionGazimagusa Teknopark, TRNC;Ministry of Education and Culture, TRNC;North Cyprus Turkcell, TRNCen_US
dc.description1st International Conference on Security of Information and Networks, SIN 2007 -- 7 May 2007 through 10 May 2007 -- Gazimagusa -- 103950en_US
dc.description.abstractEmerging trends increase the role of security in modern business life. Thus, the role of security policy has become more significant. An information security policy defines the firm's security requirements also minimizes security risks. This objective is simply realized by good collaboration between the security policy and the existing cryptographic technologies. This paper includes a descriptive and analytical understanding of the role of information security services for developing security policy; in addition, the study also explains some details of possible effects an electronic document related to this concept. Security policy developers are the main beneficiaries of this work. © 2008 Atilla Elçi.en_US
dc.language.isoenen_US
dc.publisherTafford Publishingen_US
dc.relation.ispartofSecurity of Information and Networks - Proceedings of the 1st International Conference on Security of Information and Networks, SIN 2007en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAnd E-businessen_US
dc.subjectInformation security policyen_US
dc.subjectSecurity of dataen_US
dc.subjectSecurity systemsen_US
dc.subjectAnd E-businessen_US
dc.subjectBusiness lifeen_US
dc.subjectCryptoGraphicsen_US
dc.subjectEmerging trendsen_US
dc.subjectInformation security policiesen_US
dc.subjectSecurity policyen_US
dc.subjectSecurity requirementsen_US
dc.subjectSecurity risksen_US
dc.subjectSecurity servicesen_US
dc.subjectTechnological componentsen_US
dc.subjectElectronic commerceen_US
dc.titleInformation security policy: Positioning the technological components of information security services under the perspective of electronic businessen_US
dc.typeConference Objecten_US
dc.identifier.scopus2-s2.0-84893158192en_US
dc.authorscopusid37107875500-
dc.identifier.startpage302en_US
dc.identifier.endpage307en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
item.grantfulltextreserved-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.fulltextWith Fulltext-
item.languageiso639-1en-
crisitem.author.dept05.04. Software Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Files in This Item:
File SizeFormat 
2985.pdf
  Restricted Access
38.35 kBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

2
checked on Sep 25, 2024

Page view(s)

52
checked on Sep 30, 2024

Download(s)

6
checked on Sep 30, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.