:::

詳目顯示

回上一頁
題名:資訊安全管理理論與實務之探討
書刊名:產業論壇
作者:洪國興季延平 引用關係趙榮耀
作者(外文):Hong, K. S.Chi, Y. P.Chao, L. R.
出版日期:2005
卷期:7:3
頁次:頁189-215
主題關鍵詞:資料安全資訊安全管理理論整合系統理論Information securityInformation security management theoryIntegrated system theory
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:1
  • 點閱點閱:66
期刊論文
1.林勤經、樊國楨、方仁威(20010800)。資訊安全認證與電子化網路社會。資訊安全論壇,1,29-44。  延伸查詢new window
2.Von Solms, R.、Van der Haar, H.、Von Solms, S. H.、Caelli, W. J.(1994)。A Framework for Information Security Evaluation。Information and Management,26(3),143-153。  new window
3.Drazin, R.、Van de Ven, A. H.(1985)。Alternative forms of fit in contingency theory。Administrative Science Quarterly,30(4),514-539。  new window
圖書
1.Schendel, D. E.、Hofer, C. W.(1979)。Strategic Management: A New View of Business Policy and Planning。Boston, Mass., U.S.A。  new window
2.Russell, Deborah、Gangemi, G. T.(1992)。Computer Security Basics。O'Reilly & Associates, Inc.。  new window
3.Luthans, F.(1976)。Introduction to Management: A Contingency Approach。New York, NY:McGraw-Hill。  new window
4.吳琮璠、謝清佳(1999)。資訊管理--理論與實務。智勝文化圖書。  延伸查詢new window
5.Robbins, S. P.(1994)。Management。Prentice-Hall。  new window
6.吳琮璠(2002)。會計財務資訊系統。台北:智勝文化事業有限公司。  延伸查詢new window
7.ISACA(2002)。IS Standards Guidelines and Procedures for Auditing and Control Professionals。  new window
其他
1.R.A. Clyde(2002)。資安著重管理架構。  延伸查詢new window
2.立駭科技(2002)。資訊安全委外服務研究。  延伸查詢new window
3.行政院電子中心(2002)。行政院及所屬各機關資訊安全管理規範。  延伸查詢new window
4.吳琮璠(1996)。國外政府機構資訊安全稽核制度。  延伸查詢new window
5.宋振華、楊子劍(2001)。組織資訊安全體系與資訊安全整體架構。  延伸查詢new window
6.李東峰、林子銘(2001)。風險評估觀點的資訊安全規劃架構。  延伸查詢new window
7.洪國興、季延平與趙榮耀(2003)。資訊安全管理系統之探討-捷運等相關個案研究。  延伸查詢new window
8.張瓊、于祺明與劉文君(1994)。科學理論模型的建構。  延伸查詢new window
9.陳長榮、葉長偉(2002)。防火牆安全管理之實施。  延伸查詢new window
10.黃承聖(2000)。企業資訊安全的起點-資訊安全政策。  延伸查詢new window
11.楊金炎(2001)。企業內部控制有關資訊系統與安全的個案研究。  延伸查詢new window
12.虞金燕、鄭祥勝(2001)。資訊安全發展趨勢與科轉研發方向建議。  延伸查詢new window
13.樊國楨、方仁威、林勤經與徐士坦(2001)。資訊安全管理系統驗證作業初探。  延伸查詢new window
14.樊國楨、楊晉寧(1996)。互連網(Internet)電子信息交換安全-以電子公文交換作業安全為本。  延伸查詢new window
15.鄭信一(1999)。現代企業資訊安全之個案研究。new window  延伸查詢new window
16.BS 7799-2(1999)。Information Security Management Part2: Specification. Information Security Management System。  new window
17.BS 7799-2(2002)。Information Security Management Part2: Specification Information Security Management System。  new window
18.D. B. Chapman and E. D. Zwicky(1995)。Building Internet Firewalls。  new window
19.COBIT, Governance(1998)。Control and Audit for Information and Related Techno1ogy。  new window
20.M. M. Eloff, and S. H. V. Solms(2000)。Information Security Management: An Approach to Combine Process Certification And Product Evaluation。  new window
21.C. Fenn and R. Shooter(2002)。IT Security Outsourcing。  new window
22.N. L. Flynn(2001)。The e Policy handbook: Designing and Implementing Effective E-Mail1 Internet and Software Policies。  new window
23.M. Gupta, A. R. Chaturvedi, S. Mehta and L. Valeri(2001)。The Experimental Analysis of Information Security Management Issues For Online Financial Services。  new window
24.M. Hammersiey and P. Atkinson(1989)。Ethnography: Principles in Practice。  new window
25.S. Hinde(2002)。Security Survey Spring Cow。  new window
26.ISO/IEC 17799(2000)。Information technology-code of practice for information security management。  new window
27.M. E. Kabay(1996)。The NCSA Guide to Enterprise Security。  new window
28.S. M. Lee, F. Luthans and D. L. Olson,(1982)。A Management Science Approach to Contingency Models of Organizational Structure。  new window
29.R. Moulton(199110)。A Strategic Framework for Information Security Management。  new window
30.R. C. Reid and S. A. Floyd(2001)。Extending the Risk Analysis Model to Include Market-Insurance。  new window
31.E. E. Schultz, R. W. Proctor and M. C. Lien(2001)。Usability arid Security An Appraisal of Usability Issues in Information Security Methods。  new window
32.J. Sherwood(1996)。SALSA: A method for developing the enterprise security architecture and Strategy。  new window
33.G. Simson and S. Gene(1991)。Practical UNIX Security。  new window
34.M. Smith(198910)。Computer Security-Threats, Vulnerabilities and Countermeasures。  new window
35.R. V. Solms(1996)。Information Security Management: The Second Generation。  new window
36.T. Tryfonas, E. Kiountouzis and A. Poulymanakou(2001)。Embedding Security Practices in Contemporary Information Systems Development Approaches。  new window
37.R. Weber(1999)。Information System Control and Audit。  new window
38.M. Wright(1999)。Third Generation Risk Management Practices。  new window
圖書論文
1.徐宗國(1996)。紮根理論研究法。質性研究。臺北:巨流。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE