:::

詳目顯示

回上一頁
題名:資訊安全評估準則層級結構之研究
書刊名:圖書館學與資訊科學
作者:洪國興季延平 引用關係趙榮耀
作者(外文):Hong, Kwo-shingChi, Yen-pingChao, Louis R.
出版日期:2003
卷期:29:2
頁次:頁22-44
主題關鍵詞:資訊安全整合系統理論資訊安全評估評估準則層級結構Information securityIntegrated system theoryInformation security valuationValuation criteriaHierarchical structure
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:3
  • 共同引用共同引用:11
  • 點閱點閱:52
各種調查或研究均顯示,資訊安全事故的發生比例與其所造成的財務損失均不斷上升。美國911事件、台灣納莉颱風的水災、財金公司的舞弊案等,均顯示隨著資訊科技的快速發展,資訊系統使用者的範圍不斷擴大,組織對資訊系統依賴程度的提高,資訊安全因而日愈重要。但組織資訊安全如何評估?應考慮那些評估準則?尚乏實証研究。本研究以資訊安全管理「整合系統理論」(Integrated System Theory)為基礎,經由因素分析、名目群組技術(Nominal Group Technique)的程序,匯集專家意見,建構「資訊安全評估準則層級結構」,共有9個評估構面,37項評估準則,可作為組織規劃資訊安全策略之參考,亦可作為繼續發展「資訊安全多準則評估模式」(Information Security Multiple Criteria Valuation Model)的基礎,實為資訊安全管理實証研究的重要里程碑。
Most results of various investigations and studies have shown that the percentage of information security accidents occurred and the financial losses caused are increasing continuously. September 11 attacks in the U.S.A., floods of Nari typhoon and malfeasant cases of Financial Information Service Co., Ltd. in Taiwan all indicate that information security has being more important day by day as a result of fast development of information technology, increasing range of users and dependence of an organization on information system. How to evaluate information security of an organization and what valuation criteria should be considered still lack of empirical studies. On the basis of“Integrated System Theory” of information security management, the study applies factor analysis and nominal group technique and collects opinions from experts to construct “Hierarchical Structure of Information Security Valuation Criteria”, which totally includes 9 valuation dimensions and 37 valuation criteria. The result may not only be a reference for the organization to make information security policies but also the foundation to further develop “Information Security Multiple Criteria Valuation Model”. It is obviously a key milestone of empirical studies of information security management.
期刊論文
1.吳琮璠(19961200)。國外政府機構資訊系統安全稽核制度。存款保險資訊季刊,10(2),21-40。new window  延伸查詢new window
2.Von Solms, R.、Van der Haar, H.、Von Solms, S. H.、Caelli, W. J.(1994)。A Framework for Information Security Evaluation。Information and Management,26(3),143-153。  new window
3.Drazin, R.、Van de Ven, A. H.(1985)。Alternative forms of fit in contingency theory。Administrative Science Quarterly,30(4),514-539。  new window
4.Kaiser, Henry F.、Rice, John(1974)。Little Jiffy, Mark IV。Educational and Psychological Measurement,34(1),111-117。  new window
5.Von Solms, R.(1996)。Information security management: The second generation。Computers & Security,15(4),281-288。  new window
6.Miller, George A.(1956)。The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information。The Psychological Review,63(2),81-97。  new window
7.Ellison, Robbert J.、Linger, Richard C.、Longstaff, Thomas、Mead, Nancy R.(1999)。Survivable Network System Analysis: A Case Study。IEEE Software,70-77。  new window
8.Sherwood, J.(1996)。SALSA: A Method for Developing the Enterprise Security Architecture and Strategy。Computers and Security,15(6),501-506。  new window
9.Panda, Brajendra、Giordano, Joseph(1999)。Defensive Information Warfare。Communications of the ACM,42(7),30-32。  new window
10.Reid, R. C.、Floyd, S. A.(2001)。Extending the Risk Analysis Model to Include Market-Insurance。Computers and Security,20(4),331-339。  new window
11.Saaty, T. L.、Bennett, J. P.(1977)。A Theory of Analytical Hierarchies Applied to Political Candidacy。Behavioral Science,22,237–245。  new window
12.Schultz, E. E.、Proctor, R. W.、Lien, M. C.(2001)。Usability and Security: An Appraisal of Usability Issues in Information Security Methods。Computers and Security,20(7),620-634。  new window
13.Smith, M.(1989)。Computer Security-Threats, Vulnerabilities and Countermeasures。Information Age,10,205-210。  new window
14.David, C.、Rivett, B. H. P.(1978)。A Structural Mapping Approach to Complex Decision Making。Journal of Operational Society,29(2),113-128。  new window
15.Eloff, M. M.、Von Solms, S. H.(2000)。Information Security Management: An Approach to Combine Process Certification and Product Evaluation。Computers and Security,19(8),698-709。  new window
16.Grana, M.、Torrealdea, F. J.(1986)。Hierarchically Structured Systems。European Journal of Operational Research,25,20-26。  new window
17.Lee, Sang M.、Luthans, Fred、Olson, David L.(1982)。A Management Science Approach to Contingency Models of Organizational Structure。Academy of Management Journal,25(3),553-566。  new window
18.Wright, M.(1999)。Third Generation Risk Management Practices。Computer Fraud and Security,2,9-12。  new window
19.Clyde, R. A.(20021104)。資安著重管理架構。資訊傳真周刊,4,46-47。  延伸查詢new window
20.洪國興、季延平、趙榮耀(2003)。資訊安全管理系統之探討-捷運等相關個案研究。捷運技術,28,275-308。new window  延伸查詢new window
21.黃承聖(2000)。企業資訊安全的起點-資訊安全政策。網路通訊,109,100-103。  延伸查詢new window
22.樊國楨、楊晉寧(1996)。互連網(Internet)電子信息交換安全--以電子文交換作業安全為本。電腦稽核,2,14-25。  延伸查詢new window
會議論文
1.Gupta, Mukul、Chaturvedi, Alok R.、Mehta, Shailendra、Valeri, Lorenzo(2000)。The Experimental Analysis of Information Security Management Issues for Online Financial Services。Atlanta, GA。667-675。  new window
2.Moulton, R.(1991)。A Strategic Framework for Information Security Management。  new window
3.宋振華、楊子劍(2001)。組織資訊安全體系與資訊安全整體架構。新竹。114-125。  延伸查詢new window
4.李東峰(2001)。企業資訊安全控制制度之研究。桃園。1-22。  延伸查詢new window
5.李東峰、林子銘(2001)。風險評估觀點的資訊安全規劃架構。臺北。  延伸查詢new window
學位論文
1.盧彥旭(2001)。資訊系統委外選商評選準則及權重之建立(碩士論文)。世新大學。  延伸查詢new window
2.劉永森(1991)。層級分析法(AHP)中機率性判斷之研究(碩士論文)。國立中山大學。  延伸查詢new window
3.黃智偉(2000)。供應鏈管理下供應商選擇評估之研究--以臺灣地區中衛體系之汽機車業與電腦資訊業為例(碩士論文)。雲林科技大學。  延伸查詢new window
4.唐印星(1999)。採購績效衡量關鍵因素之研究--以台灣電子、汽車、鋼鐵、機械等產業為例(碩士論文)。雲林科技大學。  延伸查詢new window
5.謝玲芬(1989)。多目標(多準則)評估技術之探討及其在組織績效評估之應用(碩士論文)。國立清華大學。  延伸查詢new window
6.葉牧青(1989)。AHP層級結構設定問題之探討(碩士論文)。國立交通大學。  延伸查詢new window
7.施穎偉(2000)。電子商務環境供應鏈供需互動模式之研究(博士論文)。國立政治大學。new window  延伸查詢new window
8.陳冠竹(2003)。政府採購入口網站功能架構與關鍵成功因素之研究,臺北。  延伸查詢new window
9.陳重光(2001)。考量網路經濟特性下影響臺灣地區商業銀行分行設立地點區位因素研究,雲林。  延伸查詢new window
10.楊金炎(2001)。企業內部控制有關資訊系統與安全的個案研討,桃園。  延伸查詢new window
11.鄭信一(1999)。現代企業資訊安全之個案研究,臺北。  延伸查詢new window
圖書
1.刀根勳(1993)。競賽式決策制定法:AHP入門。競賽式決策制定法:AHP入門。臺北市:建宏。  延伸查詢new window
2.Luthans, Fred(1976)。Introduction to Management: A Contingency Approach。Introduction to Management: A Contingency Approach。New York。  new window
3.Hwang, Ching-Lai、Lin, Ming-Jeng(1987)。Group Decision Making under Multiple Criteria: Methods and Application。New York。  new window
4.Rackham, N.、Friedman, L. F.、Ruff, R.(1995)。Getting Partnering Right: How Market Leaders Are Creating Long-term Competitive Advantage。N.Y.:McGraw-Hill Int'l Enterprises Inc.。  new window
5.Hofer, Charles W.、Schendel, Dan E.(1979)。Strategic Management: A New of Business Policy and Planning。Boston:Little, Brown。  new window
6.Gollmann, Dieter(1999)。Computer Security。John Wiley and Sons Ltd.。  new window
7.Russell, Deborah、Gangemi, G. T.(1992)。Computer Security Basics。O'Reilly & Associates, Inc.。  new window
8.張紹勳(2000)。研究方法。臺中市:滄海。  延伸查詢new window
9.Tabachnick, B. G.、Fidell, L. S.(1996)。Using multivariate statistics。HarperCollins Publishers。  new window
10.吳琮璠、謝清佳(1999)。資訊管理--理論與實務。智勝文化圖書。  延伸查詢new window
11.闕頌廉(1994)。應用模糊數學。科技圖書股份有限公司。  延伸查詢new window
12.黃俊英(2000)。多變量分析。台北:中國經濟企業研究所。  延伸查詢new window
13.吳琮璠(2002)。會計財務資訊系統。台北:智勝文化事業有限公司。  延伸查詢new window
14.Hair, Joseph F. Jr.、Anderson, Rolph E.、Tatham, Ronald L.、Black, William C.(1995)。Multivariate Data Analysis: with Readings。Prentice Hall。  new window
15.Nunnally, Jum C.、Bernstein, Ira H.(1978)。Psychometric Theory。McGraw-Hill。  new window
16.Pfleeger, Charles P.(1996)。Security in Computing。Security in Computing。Upper Saddle River, N.J.。  new window
17.Robbins, Stephen P.(1999)。Management。Management。London。  new window
18.Saaty, T. L.(1980)。The Analytic Hierarchial Process。The Analytic Hierarchial Process。New York。  new window
19.Garfinkel, Simson L.、Spafford, Gene(1991)。Practical UNIX Security。Sebastopol, CA:O'Reilly & Associates。  new window
20.Chapman, D. Brent、Zwicky, Elizabeth D.(1995)。Building Internet Firewalls。Building Internet Firewalls。Sebastopol, CA。  new window
21.Control Objectives for Information and Related Technology(1998)。Governance, Control and Audit for Information and Related Technology。Governance, Control and Audit for Information and Related Technology。Illinois。  new window
22.Flynn, N. L.(2001)。The e-Policy Handbook: Designing and Implementing Effective E-mail, Internet, and Software Policies。The e-Policy Handbook: Designing and Implementing Effective E-mail, Internet, and Software Policies。New York。  new window
23.Green, P. E.、Wind, Y.(1973)。Multiattribute Decision in Marketing: A Measurement Approach。Hinsdale, Ill.:Dryden press。  new window
24.Huber, George P.(1980)。Managerial Decision Making。Managerial Decision Making。Glenview, Ill.。  new window
25.Kabay, Michel E.(1996)。The NCSA Guide to Enterprise Security: Protecting Information Assets。The NCSA Guide to Enterprise Security: Protecting Information Assets。New York。  new window
26.Weber, R.(1999)。Information System Control and Audit。Information System Control and Audit。Upper Saddle River, NJ。  new window
27.虞金燕、鄭祥勝(2001)。資訊安全發展趨勢與科專硏發方向建議。資訊安全發展趨勢與科專硏發方向建議。臺北。  延伸查詢new window
其他
1.BS7799-1(1999)。BS7799-1 Information Security Management-Part 1: Code of Practice for Information Security Management,London。  new window
2.BS7799-2(1999)。BS7799-2 Information Security Management-Part 2: Specification for Information Security Management System,London。  new window
3.ISO,IEC 17799(2000)。ISO/IEC 17799 Information Technology-Code of practice for Information Security Management。  new window
4.(1985)。US DOD5200.28-STD Trusted Computer Systems Evaluation Criteria。  new window
5.王國明,顧志遠,洪振創(1998)。服務業績效評估模式建立理論與應用研究。  延伸查詢new window
6.林勤經,樊國楨,方仁威(2001)。資訊安全認証與電子化網路社會。  延伸查詢new window
7.樊國楨,方仁威,徐士坦(2001)。建立我國通資訊基礎建設安全機制標準規範實作芻議研究報告書。  延伸查詢new window
8.樊國楨,方仁威,林勤經,徐士坦(2001)。資訊安全管理系統驗證作業初探。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top