:::

詳目顯示

回上一頁
題名:政府機關資安治理之研究--以x政府機構為例
書刊名:電腦稽核
作者:黃明達 引用關係柯炫旭
出版日期:2010
卷期:22
頁次:頁63-78
主題關鍵詞:資通安全治理資通安全治理成熟度Information security governanceInformation security governance maturity
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:0
  • 點閱點閱:5
行政院科技顧問組於「國家資通訊安全發展方案(98年-101年)」中,將推動資通安全治理納為行動方案之一,並提供適用於政府機關之資通安全治理成熟度評估工具,期望藉由此方案落實我國政府機關的資通安全治理制度。 本論文研究目的,係透過評估工具評估x政府機構資通安全治理成熟度,搭配深入訪談了解其資通安全工作落實程度與現況,進一步探討未來落實資通安全治理可能遭遇之困難。並採用個案研究的單一個案類型為研究方法,針對x政府機構進行資通安全治理成熟度評估,了解該單位資通安全治理成熟度與實際情況,研究成果對x政府機構之資通安全治理提出其落實程度、可能遭遇之問題、改善項目及時程建議。 本論文研究對象之業務對於IT之依賴度非常高,而評估結果發現機關資通安全治理整體性之成熟度與加權平均落在「持續改善」。因此,表示x政府機構在資通安全治理方面,需加強實施風險管理為主要目標,在落實上仍需加強制訂流程來改善資通安全政策與程序,配合定期檢查與稽核相關程序,並持續改善以達良好成效。
According to the RDEC (Research, Development and Evaluation Commission, Executive Yuan) and Technology Advisory Group, "National In formation and Communications Security Development programme (2009-2012)" in promoting information and communication security control will accept one of the options for action, and to provide authority for information on government departments communication security governance maturity assessment tool, expected by the implementation of this program our government authorities information and communication security management system. The purpose of this study is to assess the maturity of x-governmental organizations information and communication security governance by adopting assessment tools the maturity of with intensive interviews to understand the extent of implementation of information security and current practices. As well as what difficulties that the organizations of managing information and communication security will foresee. To adopt a single case study is the research method of this study in order to understand the actual situation of information and communication security governance maturity in the target organizations. The outcome of this study is to state the current level of information and communication security management, possible encounter issues, action items for improvement, and schedule for x-governmental organizations. In this research, the target organizations' operation has a high dependence on IT services. The assessment result shows that the overall weighted average maturity of information and communication security governance falls on "continuous improvement" category. That means x-governmental organizations in information and communication security governance need to be enhanced in the areas of risk management as the major objectives, developing a process to improve information and communication security policies and procedures, requiring regular inspections and audit procedures, and continuous improvement in order to achieve at a good level of information security management.
期刊論文
1.Andrews, K. R.(1951)。Executive raining by the case Method。Harvard Business Review。  new window
2.Moulton, Rolf、Coles, Robert S.(2003)。Applying Information Security Governance。Computers & Security,22(7),580-584。  new window
3.Posthumus, Shaun、von Solms, Rossouw(2004)。A Framework for the Governance of Information Security。Computers & Security,23(8),638-646。  new window
4.von Solms, Rossouw、von Solms, Sebastiaan H. Basie(2006)。Information Security Governance: A model based on the Direct-Control Cycle。Computers & Security,25(6),408-412。  new window
5.Peterson, Ryan(2004)。Crafting Information Technology Governance。Information Systems Management,21(4),7-23。  new window
6.von Solms, S. H.(2005)。Information security governance - compliance management vs operational management。Computers & Security,24(6),443-447。  new window
7.Andersen, P. W.(2001)。Information Security Governance。Information Security Technical Report,6(3),60-70。  new window
8.(2009)。國家資通訊安全發展方案(98年--101年)。行政院國家資通安全會報,18-21。  延伸查詢new window
9.Allen, Julia H.、Westby, Jody R.(2007)。Characteristics of Effective Security Governance。EDPACS,35(5),1-17。  new window
10.Benbasat, I.、Goldstein, D.、Mead M.(1987)。The Case Research in Studies of Information System。MIS Quarterly,11(3),369-386。  new window
會議論文
1.Van Grembergen, W.(2005)。Introduction to the Minitrack IT Governance and its Mechanisms。The 38th Hawaii International Conference on System Sceiences,235-235。  new window
研究報告
1.Corporate Governance Task Force(2004)。Information Security Governance -a Call to Action。  new window
圖書
1.Koch, R.(1999)。The 80/20 principle: The secret to success by achieving more with less。Yarmouth:Nicholas Brealey Publishing Ltd.。  new window
2.黃明達、蕭瑞祥(2007)。資安推動發展政策整合研究--資安治理機制與資安建設持續發展規劃。臺北:行政院科技顧問組。  延伸查詢new window
3.Bowen, Pauline、Hash, Joan、Wilson, Mark(2006)。Information Security Handbook: A Guide for Managers。National Institute of Standards and Technology。  new window
4.ISACA(2003)。Board briefing on IT Governance。IT Governance Institute。  new window
5.ISACA(2006)。Information Security Governance: Guidance for Boards of Directors and Executives Management。IT Governance Institute。  new window
6.行政院研考會(2006)。我國政府資通安全應用調查報告。  延伸查詢new window
7.孫強(2004)。資訊安全治理。  延伸查詢new window
8.Poore, Ralph Spencer(2005)。Information Security Governance。EDPACS。  new window
9.Yin, Robert K.(1994)。Case study research: Design and methods。Sage Publications。  new window
單篇論文
1.行政院科技顧問組(2009)。資安治理機制研究規劃報告,臺北。  延伸查詢new window
其他
1.Swindle, O.,Conner, B.(2004)。The Link between Information Security and Corporate Governance,http://www.computerworld.com/securitytopics/security/story/O,,92915,00.html?SKC=security-92915。  new window
2.Entrust. Information Security Governance (ISG): an essential element of corporate governance,http://itresearch.forbes.com/detail/RES/1082396487_702.html。  new window
3.The World Bank。What is our approach to governance,http://web.worldbank.org/。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE