:::

詳目顯示

回上一頁
題名:Information Security and e-Business/Commerce
書刊名:Asia Pacific Management Review
作者:Sueyoshi, ToshiyukiTadiparthi, Gopalakrishna ReddyAnselmo, Peter
出版日期:2004
卷期:9:5
頁次:頁823-850
主題關鍵詞:Information securityInformation technologyFirewalls
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:22
Information security is an increasingly important concern among many corporate leaders and system managers who are responsible for computer systems. A modern Information Technology (IT) system, drastically changing the current business/management, is structured by an open system where many different disturbances (e.g., corporate secret agents, hackers and terrorists) influence the IT-based decision making process and business performance/practice. This study is concerned about such a security issue, in particular focusing upon how the infrastructure of a corporate network is protected from hostile agents. The study is also interested in whether the security issue influences our corporate decision making in the ebusiness world.
期刊論文
1.Rees, J.、Bandyopadhyay, S.、Spafford, E. H.(2003)。PFIRES: A Policy Framework for Information Security。Communications of the ACM,46(7),101-106。  new window
2.Power, R.(2002)。2002 CSI/ FBI Computer Crime and Security Survey。Computer Security Journal,8(1),1-24。  new window
3.Anderson, J. M.(2003)。Why We Need a New Definition of Information Security。Computers & Security,22(4),308-313。  new window
4.Bellovin, S. M.(1989)。Security Problems in the TCP/ IP Protocol Suite。Computer Communication Review,19(2),32-48。  new window
5.Bianco, D.(2003)。Insider Risk: Who Do You Trust?。Information Security,6(10),44-54。  new window
6.Briney, A.、Prince, F.(2003)。Security Survey: Disciplined Security。Information Security,6(10),56-64。  new window
7.Denning, P. J.、Brandin, D. H.、Schwartz, D. C.、Davida, G. I.(1981)。Report of the Public Cryptography Study Group。Communications of the ACM,24(7),435-450。  new window
8.Frantzen, M.、Kerschbaum, F.、Schultz, E.、Fahmy, S.(2001)。A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals。Computers & Security,20(3),263-270。  new window
9.Hayashi, K.、Sueyoshi, T.(1994)。Information Infrastructure Development: International Comparison Between the United States and Japan。Telematics and Informatics,11(3),153-166。  new window
10.Kamara, S.、Fahmy, S.、Schultz, E.、Kerschbaum, F.、Frantzen, M.(2003)。Analysis of Vulnerabilities I Internet Firewalls。Computers & Security,22(3),214-232。  new window
11.Kent, Stephen(1989)。Comments on 'Security Problems in the TCP/ IP Protocol' Suite。Computer Communication Review,19(3),10-19。  new window
12.Landwehr, C. E.、Bull, A. R.、McDermott, J. P.、Choi, W. S.(1994)。A Taxonomy of Computer Program Security Flaws。ACM Computing Surveys,26(3),211-254。  new window
13.McPhee, W. S.(1974)。Operating System Integrity in OS/ VS2。The IBM System Journal,13(3),230-252。  new window
14.Neumann, P. G.(2003)。Information System Security Redux。Communications of the ACM,46(10)。  new window
15.Perry, T. S.、Wallich, P.(1984)。Can Computer Crime Be Stopped?。IEEE Spectrum,21(5),34-45。  new window
16.Rash, M.(2003)。Firewalls: Doing It Yourself。Information Security,6(10),70-75。  new window
17.Rosen, E. C.(1981)。Vulnerabilities of Network cCntrol Protocols: An Example。Computer Communication Review,11(3),10-16。  new window
18.Venter, H. S.、Eloff, J. H. P.(2003)。A Taxonomy for Information Security Technologies。Computers & Security,22(4),299-307。  new window
19.Whitman, M. E.(2003)。Enemy at the Gate: Threats to Information Security。Communications of the ACM,46(8),91-95。  new window
會議論文
1.Bishop, M.、Bailey, D.(1996)。A Critical Analysis of Vulnerability Taxonomies。沒有紀錄。  new window
2.Jayaram, N. D.、Morse, P. L. R.(1997)。Network Security - a Taxonomic View。沒有紀錄。28-30。  new window
3.Ker, K.(1996)。Internet firewalls: Questions and Answers。沒有紀錄。65-77。  new window
4.Kumar, S.、Spafford, E. H.(1994)。A Pattern Matching Model for Misuse Intrusion Detection。沒有紀錄。11-21。  new window
5.Lindqvist, U.、Jonsson, E.(1997)。How to Systematically Classify Computer Security Intrusions。Gothenburg, Sweden。154-163。  new window
6.Neumann, P. G.、Parker, D. B.(1989)。A Summary of Computer Misuse Techniques。沒有紀錄。396-407。  new window
7.Parker, D. B.(1991)。Restating the Foundation of Information Security。Washington, DC。480-493。  new window
8.Ristenbatt, M. P.(1988)。Methodology for Network Communication Vulnerability Analysis。沒有紀錄。493-499。  new window
9.Straub, D. W.、Widom, C. S.(1984)。Deviancy by Bits and Bytes: Computer Abusers and Control Measures。Toronto, Canada。431-441。  new window
10.Wilner, B. D.(1996)。Six Pitfalls in Firewall Deployment。沒有紀錄。78-86。  new window
研究報告
1.Howard, J. D.、Longstaff, T. A.(1998)。A Common Language for Computer Security Incidents。Livermore, CA。  new window
2.Abbott, R. P.、Chin, J. S.、Donnelley, J. E.、Konigsford, W. L.、Tokubo, S.、Webb, D. A.(1976)。Security Analysis and Enhancements of Computer Operating Systems。Washington, USA。  new window
3.Anderson, J. P.(1980)。Computer Security Threat Monitoring and Surveillance。Fort Washington, PA。  new window
4.Aslam, T.、Krsul, I.、Spafford, E. H.(1996)。Use of a Taxonomy of Security Faults。West Lafayette, IN。  new window
5.Bisbey, R.、Hollingworth, D.(1978)。Protection Analysis: Final Report。Marina del Rey, CA。  new window
6.Konigsford, W. L.(1976)。A Taxonomy of Operating-System Security Flaws。CA, USA。  new window
7.Krsul, I. V.(1997)。Computer Vulnerability Analysis Thesis Proposal。West Lafayette, IN。  new window
學位論文
1.Aslam, T.(1995)。A taxonomy of Security Faults in the UNIX Operating Systems,West Lafayette, IN。  new window
2.Howard, J. D.(1997)。An Analysis of Security Incidents on the Internet,Pittsburgh, PA。  new window
3.Krsul, I. V.(1998)。Software Vulnerability Analysis,West Lafayette, IN。  new window
4.Kumar, S.(1995)。Classification and Detection of Computer Intrusion,West Lafayette, IN。  new window
5.Richardson, T. W.(2001)。The Development of a Database Taxonomy of Vulnerabilities to Support the Study of Denial of Service Attacks,USA。  new window
圖書
1.Schneier, B.(1996)。Applied Cryptography: Protocols, Algorithms, and Source Code in C。Applied Cryptography: Protocols, Algorithms, and Source Code in C。New York, NY:John Wiley & Sons。  new window
2.Neumann, P. G.(1995)。Computer Related Risks。ACM Press。  new window
3.Sun Tzu、Cleary, Thomas(1988)。The Art of War。Oxford, UK:Oxford University Press。  new window
4.Ahuja, V.(1996)。Network and Internet Security。Network and Internet Security。MA, USA。  new window
5.Amoroso, E. G.(1994)。Fundamentals of Computer Security Technology。Fundamentals of Computer Security Technology。沒有紀錄。  new window
6.Anonymous(1998)。Maximum Security - a Hacker's Guide to Protecting Your Internet Site and Network。Maximum Security - a Hacker's Guide to Protecting Your Internet Site and Network。Indiana, USA。  new window
7.Beizer, B.(1990)。Software Testing Techniques。Software Testing Techniques。New York, NY。  new window
8.Bishop, M.(1996)。NISSC Panel on Vulnerabilities Data: The UC Davis Vulnerabilities Project。Classifying Vulnerabilities。沒有紀錄。  new window
9.Brinkley, D. L.、Schell, R. R.(1995)。What Is There to Worry about? An Introduction to the Computer Security Problem。Information Security: An Integrated Collection of Essays。Los Alamitos, CA。  new window
10.Burgess, M.(2000)。Principles of Network and System Administration。Principles of Network and System Administration。England。  new window
11.Burstein, H.(1994)。Introduction to Security。Introduction to Security。NJ, USA。  new window
12.Cameron, D.(1997)。Intranet Security。Intranet Security。South Carolina, USA。  new window
13.Ford, W.、Baum, M. S.(1997)。Secure Electronic Commerce: Building the Infrastructure for Digital Signatures & Encryption。Secure Electronic Commerce: Building the Infrastructure for Digital Signatures & Encryption。New Jersey, USA。  new window
14.Gasser, M.(1988)。Building a Secure Computer System。Building a Secure Computer System。New York, NY。  new window
15.Kahn, D.(1967)。The Codebreakers: The Story of Secret Writing。The Codebreakers: The Story of Secret Writing。New York, NY。  new window
16.Lynch, D. C.、Rose, M. T.(1993)。Internet System Handbook。Internet System Handbook。MA, USA。  new window
17.McDaniel, G.(1994)。IBM Dictionary of Computing。IBM Dictionary of Computing。New York, NY。  new window
18.Parker, D. B.(1989)。Computer Crime: Criminal Justice Resource Manual。Computer Crime: Criminal Justice Resource Manual。沒有紀錄。  new window
19.Parker, D. B.(1997)。Computer Security Reference Book。Computer Security Reference Book。Florida, USA。  new window
20.Richardson, R.(2003)。CSI/ FBI Computer Crime and Security Survey。CSI/ FBI Computer Crime and Security Survey。USA。  new window
21.Schwartau, W.(1996)。Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age。Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age。NY, USA。  new window
22.Security(1911)。Century Dictionary。Century Dictionary。沒有紀錄。  延伸查詢new window
23.Security(2000)。The American Heritage(r) Dictionary of the English Language。The American Heritage(r) Dictionary of the English Language。沒有紀錄。  new window
24.Stallings, W.(1995)。Network and Internetwork Security: Principles and Practice。Network and Internetwork Security: Principles and Practice。NJ, USA。  new window
25.Stein, L. D.(1998)。Web Security: A Step-by-Step Reference Guide。Web Security: A Step-by-Step Reference Guide。USA。  new window
26.Zwicky, E. D.、Cooper, S.、Chapman, D. B.(2000)。Building Internet Firewall。Building Internet Firewall。CA, USA。  new window
其他
1.Allen, J.(2002)。Firewalls and Proxies,沒有紀錄。  new window
2.Beale, J.(2002)。Linux Firewalls and Their Advantages over Windows,沒有紀錄。  new window
3.Cohen, F.(1996)。Internet Holes-Eliminating IP Address Forgery. Management Analytics,沒有紀錄。  new window
4.Harrison, P.(2003)。Linux firewalls using iptables, Quick HOWTO-www.linuxhomenetworking.com,沒有紀錄。  new window
5.Information(2002)。Merriam-Webster Online Dictionary,沒有紀錄。  new window
6.Information(2003)。Wikipedia: The Free Encyclopedia,沒有紀錄。  new window
7.Knight, E.(2000)。Computer Vulnerabilities,沒有紀錄。  延伸查詢new window
8.Marsh, R. T.(1997)。Critical Foundations: Protecting America's Infrastructures,沒有紀錄。  new window
9.Schneier, B.(2002)。AES News. Crypto-Gram Newsletter,沒有紀錄。  new window
10.SOCKS(2002)。About SOCKS, Permeo Technologies,沒有紀錄。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
無相關點閱
 
QR Code
QRCODE