:::

詳目顯示

回上一頁
題名:影響組織採行與應用資訊安全管理系統認證之關鍵因素
書刊名:電腦稽核
作者:洪新原張碩毅 引用關係郭吉原
出版日期:2011
卷期:23
頁次:頁99-112
主題關鍵詞:資訊安全管理系統資訊安全管理系統認證創新擴散理論資訊系統採用資訊系統應用Information security management systemsISMSInformation security management system certificationInnovation diffusion theoryInformation system adoptionInformation system application
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:5
組織對資訊科技的依賴及程度是與日俱增,建構一個有系統且全面的資訊安全管理機制,已成為企業與政府首要任務。本研究參考創新擴散理論發展出組織採行與應用資訊安全管理系統認證之關鍵因素模式,使用「組織特性」、「環境特性」、「資訊安全管理系統特性」等三個構面來探討影響組織採行與應用資訊安全管理系統認證之關鍵因素,利用問卷調查法,主要針對已通過和依規定必須通過資訊安全管理系統認證的政府組織以及各大企業為調查對象。研究結果顯示,「高階主管支持」、「產業競爭強度」、「教育訓練」、「相對優勢」、「相容性」和「成本」等六個因素會影響組織採行資訊安全管理系統認證;目前取得認證通過的組織陸續增加中,本研究結果可提供各產業組織未來導入資訊安全管理系統認證時之參考。
Since the reliance on information technology is increasing, organizations are confronting the threats of information security accordingly. It has been an important issue for organizations in the adoption of information security management systems (ISMS) certification to enhance information security capacities. This research summarized the factors which influence the adoption and application of ISMS Certification from organizational characteristics, environmental characteristics and information systems characteristics. This study utilized survey to investigate why government agents and enterprises adopted ISMS. The results indicated that top managers support, competition pressure, training, relative advantage of ISMS, compatibility of ISMS and cost of ISMS significantly affect the organizational adoption of ISMS certification. Overall, this study provides a wave of managerial implications for governmental organizations, enterprises and information service vendors are also provided.
期刊論文
1.Premkumar, G.、Ramamurthy, K.、Crum, M.(1997)。Determinants of EDI Adoption in the Transportation Industry。European Journal of Information Systems,6(2),107-121。  new window
2.Schillewaert, N.、Ahearne, M. J.、Frambach, R. T.、Moenaert, R. K.(2005)。The adoption of information technology in the sales force。Industrial Marketing Management,34(4),323-336。  new window
3.Burton-Jones, Andrew、Hubona, Geoffrey S.(2006)。The mediation of external variables in the technology acceptance model。Information & Management,43(6),706-717。  new window
4.Johnson, J.(1995)。Chaos: The Dollar Drain of IT Project Failures。Application Development Trends,2(1),41-48。  new window
5.Thong, J. Y. L.、Yap, C. S.、Raman, K. S.(1996)。Top management support, external expertise and information systems implementation in small business。Information Systems Research,7(2),248-267。  new window
6.Wu, F.、Yeniyurt, S.、Kim, D.、Cavusgil, S. T.(2006)。The Impact of Information Technology on Supply Chain Capabilities and Firm Performance: A Resource-based View。Industrial Marketing Management,35(4),493-504。  new window
7.Premkumar, G.、Roberts, M.(1999)。Adoption of New Information Technologies in Rural Small Business。Omega--International Journal of Management Science,27(4),467-484。  new window
8.Yap, C. S.、Soh, C. P. P.、Raman, K. S.(1992)。Information Systems Success Factors in Small Business。Omega, International journal of Information Management,20(5/6),597-609。  new window
9.Soliman, K. S.、Janz, B. D.(2004)。An exploratory study to identify the critical factors affecting the decision to establish Internet-based interorganizational information systems。Information and Management,41(6),697-706。  new window
10.Plouffe, C. R.、Hulland, J. S.、Vandenbosch, M.(2001)。Research report: richness versus parsimony in modeling technology adoption decisions--understanding merchant adoption of a smart card-based payment system。Information Systems Research,12(2),208-222。  new window
11.Holland, C.、Light, B.(1999)。A critical success factors model for ERP implementation。IEEE Software,16(3),30-36。  new window
12.Bingi, Prasad、Sharma, Maneesh K.、Godla, Jayanth K.(1999)。Critical issues affecting an ERP implementation。Information Systems Management,16(3),30-36。  new window
13.Eloff, M. M.、Von Solms S. H.(2000)。Information Security Management: An Approach to Combine Process Certification and Product Evaluation。Computers & Security,19(1),698-709。  new window
14.Grover, V.、Goslar, M. D.(1993)。The initiation, adoption, and implementation of telecommunications technologies in US organizations。Journal of Management Information systems,10(1),141-164。  new window
15.Huang, S. M.、Hung, Y. C.、Yen, D. C.(2005)。A Study on decision factors in adopting on online stock trading system by brokers。Decision Support Systems,40(2),315-328。  new window
16.Hunh, K. K.、Lim, Y. G.(2001)。The critical success factors for ERP implement: an organizational fit perspective。Information & Management,40(1),25-40。  new window
17.Lillywhite, T.(1999)。How to protect your information--an introduction to BS7799。Management Services,43(1),21-22。  new window
18.Premkumar, G.、Ramamurthy, K.(1995)。Role of Interorganizational and Organizational Factors on the Decision Mode of Adoption of Interorganizational Systems。Decision Science,26(3),303-336。  new window
19.Premkumar, G.、Ramamurthy, K.、Nilakanta, S.(1994)。Implementation of Electronic Data Interchange: An Innovation Adoption Perspective。Journal of Management Information Systems,11(2),157-186。  new window
20.Schultz, E. E.、Proctor, R. W.、Lien, M. C.、Salvendy, G.(2001)。Usability and Security an appraisal of usability issues in information security methods。Computer and Security,20(7),620-634。  new window
21.Thong, J. Y. L.(1999)。An Intergrated model of Information Systems Adoption in small Business。Journal of Management Information Systems,15(4),187-214。  new window
22.Thong, J. Y. L.(2001)。Resource Constrains and Information Systems Implementation in Singaporean Small Business。OMEGA,29(2),143-156。  new window
23.Williams, P. A. H.(2008)。In a ‘trusting’ environment, everyone is responsible for information security。Information Security Technical Report,13(4),207-215。  new window
24.Bansal, P.、Roth, K.(2000)。Why companies go green: A model of ecological responsiveness。Academy of Management Journal,43(4),717-736。  new window
25.Umble, E. J.、Haft, R. R.、Umble, M. M.(2003)。Enterprise resource planning: Implementation procedures and critical success factors。European Journal of Operational Research,146(2),241-257。  new window
26.Tornatzky, L. G.、Klein, K. J.(1982)。Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings。IEEE Transactions on Engineering Management,29(1),28-45。  new window
27.Cheung, W.、Chang, M. K.、Lai, V. S.(2000)。Prediction of internet and world wide web usage at work: A test of an extended triandis model。Decision Support Systems,30(1),83-100。  new window
28.Agarwal, Ritu、Prasad, Jayesh(1997)。The Role of Innovation Characteristics and Perceived Voluntariness in the Acceptance of Information Technologies。Decision Sciences,28(3),557-582。  new window
29.Kimberly, John R.、Evanisko, Michael J.(1981)。Organizational Innovation: The Influence of Individual, Organizational, and Contextual Factors on Hospital Adoption of Technological and Administrative Innovations。Academy of Management Journal,24(4),689-713。  new window
30.Subramanian, A.、Nilakanta, S.(1996)。Organizational innovation exploring the relationship between organizational determinants for innovation, types of innovations and measures of organizational performance。International Journalof Management Science,24(6),631-647。  new window
圖書
1.Kassarjian, H. H.、Robertson, T. S.(1991)。Perspectives in Consumer Behavior。Englewood Cliffs, N. J.:Prentice Hall。  new window
2.British Standards Institution(2005)。Information Technology--Security techniques--Code of practice for information security management。BSI。  new window
3.Hair, Joseph F. Jr.、Anderson, Rolph E.、Tatham, Ronald L.、Black, William C.、Babin, Barry J.(1998)。Multivariate data analysis。Prentice-Hall, Inc.。  new window
4.Rogers, Everett M.(1995)。Diffusion of innovations。Free Press。  new window
單篇論文
1.CSI,FBI(2008)。CSI/FBI 2007 Computer Crime and Security Survey,CSI:FBI。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE