1. How to submit my research paper? What’s the process for publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: joams@ejournal.net.

2.Can I submit an abstract?
The journal publishes full research papers. So only full paper submission should be considered for possible publication...[Read More]

Information Security Policy Development

Ibrahim H. Al-Mayahi and Sa’ad P. Mansoor
School of Computer Science, Bangor University, UK
Abstract—The aim of this paper is to develop a comprehensive policy for the UAE e-Government, to protect the information systems and the exchange of information between different department’s employees and citizens using e-Government services. The lack of a comprehensive information security policy was identified as a major concern and barriers to developing a secure information system for e-Government. This work describes the development of comprehensive Information Security Policy, to ensure that the UAE e-Government departments, uses the same standards in every security instance. This will make it easier for different departments to integrate, and interact with citizens, and ensure that the UAE e-Government will always be able to protect the information assets in a manner that supports and is not in conflict with providing a high level of customer service.

Index Terms—information security, policy, security controls, e-government

Cite: Ibrahim H. Al-Mayahi and Sa’ad P. Mansoor, "Information Security Policy Development," Journal of Advanced Management Science, Vol. 2, No. 2, pp. 135-139, June 2014. doi: 10.12720/joams.2.2.135-139
Copyright © 2013-2022 Journal of Advanced Management Science, All Rights Reserved