Access the full text.
Sign up today, get DeepDyve free for 14 days.
L. Blumenfeld
Dissertation could be security threat: student's maps illustrate concerns about public information
OECD
OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security
Winn Schwartau (2000)
Looming Threats to U.S. SecurityAsymmetrical adversariesOrbis, 44
Commission of European Communities
Network and Information Security: Proposal for a European Policy Approach
G. Oppenheimer (1990)
National Information Policies: A Review of the Situation in Seventeen Industrialized Countries, with Particular Reference to Scientific and Technical InformationBulletin of The Medical Library Association, 78
Commission of European Communities
eEurope 2005: An Information Society for All
EOS Gallup Europe
Internet and the public at large
W. Schwartau
Asymmetrical adversaries
D. Verton
Cyberdefense plan gets mixed reviews
Linda Pesante (2002)
CERT® Coordination Center
P. Judge (1985)
National information policy
President's Commission on Critical Infrastructure Protection
The National Strategy to Secure Cyberspace
Domestic Council
National Information Policy: A Report to the President of the United States
OECD
About OECD
W.B. Scott
Nascent new‐centric war gains pentagon toehold
Harry Bruce (2002)
The User's View of the Internet
CERT Coordination Center
CERT/CC Statistics 1998‐2003
M. Vatis (2001)
Cyber Attacks During the War on Terrorism: A Predictive Analysis
Official Journal of the European Communities
Council Resolution of 28 January 2002 on a common approach and specific actions in the area of network and information security
This article presents an overview of the historical development of information security policies promulgated by a variety of governments and agencies. After a brief history of the development of government technology policy in the electronic age, and a review of the possible cyber‐security threats to today's military and civilian populations, policy documents from the organization for economic co‐operation and development, the European Union, and the USA are described and compared. Analysis of the policy documents shows some similarities in the manner by which national and supra‐national political agencies are reacting to the threat of cyber‐attack. The paper alerts the library community to possible compromise in the systems with which we work, and provides some understanding of the process by which the government is reacting to threats. It concludes by encouraging the librarian to become more actively involved and informed concerning the development of government policies in this area.
New Library World – Emerald Publishing
Published: Jul 1, 2004
Keywords: Libraries; Librarians; Data security; Government policy; European Union; United States of America
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.