期刊文献+

基于风险控制的大学信息安全政策体系构建——基于美国8所大学的实践分析 被引量:2

The Construction of University Information Security Policy System Based on Risk Control——Practical Analyses of 8 American Universities
下载PDF
导出
摘要 [目的/意义]通过对美国8所大学的信息安全政策体系进行研究,为国内大学加强信息安全政策体系建设提供有益的参考。[方法/过程]采用网站调查法和案例分析法研究了美国大学的信息安全政策构建的模式和特点。[结果/结论]基于对美国大学信息安全政策体系构建特点的分析,提出了5项启示性建议。 [Purpose/Significance]The article analyzed the information security policy system based on risk control of 8universities in the United States,in order to provide useful references for strengthening the information security policy system in our country.[Method/Process]This paper adopted web survey and case analysis methods to study the model and characteristics of the information security policy system.[Result/Conclusion]Based on analyses of the characteristics of the information security policy system in American Universities,this paper put forward five suggestions.
作者 张立新 周秀霞 许亮 Zhang Lixin Zhou Xiuxia Xu Liang(Library, Changchun Technology University, Changchun 130012, China Library, Northeast Normal University, Changehun 130024, China)
出处 《现代情报》 CSSCI 北大核心 2016年第10期102-106,共5页 Journal of Modern Information
基金 吉林省社会科学基金项目"吉林省数字资源信息安全策略研究"(项目编号:2014B44)的研究成果之一
关键词 美国大学 信息安全 风险控制 政策体系 american university information security risk control policy system
  • 相关文献

参考文献13

  • 1百度百科.大学 [EB/OL].http:∥baike.baidu.com/link?url= JdaQSg2xLn1rzVJFr9MpzOYBBGeSo2LUxhCYNu1LCd 9erXGBIXfhO0trX4ZPHqcypYIQ191Cmg5XJP5I2SWaXHnKf7tGmMVzu5fjhhu,2015-12-08.
  • 2IT security framework [EB/OL].http:∥ocio.osu.edu/itse-curity/framework,2015-12-08.
  • 3IT security framework [EB/OL].http:∥ocio.osu.edu/itse-curity/framework,2015-12-08.
  • 4林新.美国高校图书馆信息安全管理分析与启示[J].图书馆建设,2014(3):80-82. 被引量:10
  • 5Great faith in the instructional benefits of digital technologies;great expectations for the rising use of OER [EB/OL].http:∥www.campuscomputing.net/item/2015-campus-compu-ting-survey-0,2015-12-08.
  • 6Information technology (IT)security university policy [EB/OL].http:∥ocio.osu.edu/sites/default/files/assets/Policies/ITSecurity.pdf,2015-12-08.
  • 7Information security policy [EB/OL].http:∥www.prince-ton.edu/oit/it-policies/it-security-policy/Documents/In-formationSecurityPolicy.pdf,2015-12-08.
  • 8Information security [EB/OL].http:∥itservices.stanford.edu/security,2015-12-08.
  • 9Policies & practices [EB/OL].http:∥www.cmu.edu/iso/governance/index.html,2015-12-08.
  • 10Secure computing [EB/OL].http:∥its.yale.edu/secure-computing/security-standards-and-guidance,2015-12-08.

二级参考文献7

  • 1Thompson S T C. Helping the Hacker? Library Information, Security, and Social Engineering[J]. Information Technology and Libraries, 2013,25(4):222-225.
  • 2Shuman B A. Library Security and Safety Handbook: Prevention, Policies and Procedures[M]. Chicago:ALA Store, 1999:55.
  • 3Green K C. Campus Computing, 2000: The 11th National Survey of Computing and Information Technology in American Higher Education[J]. American Educational Research Journal,2001 (5): 15.
  • 4Green K C. The 2010 Campus Computing Survey[J].Retrieved October,2010(6):2011.
  • 5Librmy Policies[EB/OL].[2013-12-16].http://www.utdallas.edu/library/.
  • 6王东波,张宏涛.数字图书馆数据安全技术的新进展及应用研究[J].图书馆学研究,2008(6):7-10. 被引量:5
  • 7丁小文.网络时代的图书馆信息安全理论与技术问题研究[J].中国图书馆学报,1998,24(5):38-41. 被引量:28

共引文献9

同被引文献22

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部