@article{MAKHILLIJSC20072320848, title = {Information Security Policy: Relevance, Creation and Enforcement}, journal = {International Journal of Soft Computing}, volume = {2}, number = {3}, pages = {408-410}, year = {2007}, issn = {1816-9503}, doi = {ijscomp.2007.408.410}, url = {https://makhillpublications.co/view-article.php?issn=1816-9503&doi=ijscomp.2007.408.410}, author = {A.J. Jegede,G.I.O. Aimufua and}, keywords = {Auditing,enforcement,information,information security,security,security policy}, abstract = {Electronic information and the means for transmitting and processing it are now indispensable to many areas of operations in organizations. The power and convenience of information technology is, however, counterbalanced by the wide range of threats to the security of electronic information. This study explores the concept and relevance of security as it relates to electronic information systems. It also sets out the background to preparing an information security policy as well as the strategies required for implementing and enforcing such policy.} }