Policy Highlights from Communications of the ACM – June 2011 (Vol. 54, No. 6)

Below is a list of items with policy relevance from the June issue of Communications of the ACM. As always, much of the material in CACM is premium content, and free content one month may slip behind a pay wall the next. You need to be a member of ACM or a subscriber to CACM to access premium content online.

Column: Privacy and Security
Identity Management and Privacy: A Rare Opportunity to Get it Right by Ari Shapiro
The Senior Internet Policy Advisor at the National Institute of Standards and Technology discusses how the proposed National Strategy for Trusted Identities in Cyberspace offers a way to protect privacy, assure identities, and maintain the benefits of the Internet.

Practice
Does Deterrence Work in Reducing Information Security Policy Abuse by Employees? by Qing Hu, Zhengchuan Xu, Tamara Dinev and Hong Ling
A review of the authors research in the relationships between security policies and behavior in corporate settings, with an emphasis on how effective deterrence is in reducing violations.

This entry was posted in ACM/USACM News. Bookmark the permalink. Comments are closed, but you can leave a trackback: Trackback URL.