:::

詳目顯示

回上一頁
題名:資訊安全委外決策類型之初探
書刊名:企業管理學報
作者:唐震劉奕萱
作者(外文):Tang, JennLiu, Yi-hsuan
出版日期:2012
卷期:92
頁次:頁1-38
主題關鍵詞:資訊安全委外決策代理理論交易成本理論Information securityOutsourcingDecisionAgent theoryTransaction cost theory
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:3
  • 點閱點閱:39
越來越多的公司將非核心企業活動進行委外,甚至於向外界購買資訊安全服務,因此促使資安委外(information security outsourcing, ISO)議題浮現。ISO決策模式的重要性,實遠大於探討軟硬體相關的資安產品,然而,關於企業如何決定委外作業,卻有不同觀點。本研究以台灣上市櫃企業及部分公部門與大專教育單位為對象,分析管理者在執行ISO作業時的相關因素,透過文獻分析與訪談結論指出六個不同重要性等級的決策構面為:組織、成本、合約、承包商、風險、服務,以及ISO三大決策類型:委外敏感型、委外穩健型、委外保守型,分別最重視:風險、合約、組織,最後並推論學術及管理意涵,並給予實務應用建議方向。
They are more and more companies outsource their non-kernel business activity to other professional firms, such as the service of information security. Thus, the topic of information security outsourcing (ISO) has emerged gradually now. The consideration of regarding to the determination of ISO is actually more important than that of only discussion which hardware or software of information security products should be used inside company. However, the view points are quite different about the business process while regarding with how to determine the outsourcing. We chose the public traded company, public sector and educational unit as samples. We analyzed the relative factors when managers conduct ISO activities. According to literature review and conclusion of depth interview, we obtain six important levels of decisive construction. They are organization, cost, contract, subcontractor, risk and service. And, three decisive models which are outsourcing sensitive type, outsourcing stability type and outsourcing conservative type. Besides, risk, cost and organization are thought highly respectively among the three decisive models. At last, we also introduce the academic and administrative meaning and suggest the directions of practical application.
期刊論文
1.徐綺憶、王存國(20010100)。資訊系統委外程度之影響因素探討。資訊管理研究. 中央大學,3(1),105-128。new window  延伸查詢new window
2.Bergen, Mark E.、Dutta, Shantanu、Walker, Orville C. Jr.(1992)。Agency Relationships in Marketing: A Review of the Implications and Applications of Agency Related Theories。Journal of Marketing,56(3),1-24。  new window
3.Mao, J. Y.、Lee, J. N.、Deng, C. P.(2008)。Vendors' perspectives on trust and control in offshore information systems outsourcing。Information & Management,45(7),482-492。  new window
4.Kotulic, A. G.、Clark, J. G.(2004)。Why there aren't more information security research studies?。Information and Management,41(5),597-607。  new window
5.Kettinger, W. J.、Lee, C. C.(1997)。Pragmatic Perspectives on the Measurement of Information Systems Service Quality。MIS Quarterly,21(2),223-240。  new window
6.Aubert, B. A.、Patry, M.、Rivard, S.(1996)。A Transaction Cost Approach to Outsourcing Behavior: Some Empirical Evidence。Information & Management,30(2),51-64。  new window
7.Loh, L.、Venkatraman, N.(1992)。Determinants of information technology outsourcing: A cross-sectional analysis。Journal of Management Information Systems,9(1),7-24。  new window
8.Williamson, Oliver E.(1981)。The Modern Corporation: Origins, Evolution, Attributes。Journal of Economic Literature,19(4),1537-1568。  new window
9.Williamson, Oliver E.(1979)。Transaction-Cost Economics: The Governance of Contractual Relations。The Journal of Law and Economics,22(2),233-261。  new window
10.Williamson, Oliver E.(1991)。Comparative Economic Organization: The Analysis of Discrete Structural Alternatives。Administrative Science Quarterly,36(2),269-296。  new window
11.Jensen, Michael C.、Meckling, William H.(1976)。Theory of the firm: Managerial behavior, agency costs and ownership structure。Journal of Financial Economics,3(4),305-360。  new window
12.趙琪、林正士(2002)。廣告管理決策前因之研究:整合代理理論與交易成本。管理學報,19(5),927-948。new window  延伸查詢new window
13.林晉寬、陳奇修(2007)。交易理論是解釋組織統治決策的有效理論嗎?--台灣之實證研究觀察。中華管理評論國際學報,10(3),1-21。  延伸查詢new window
14.洪國興、季延平、趙榮耀(2006)。影響資訊安全關鍵因素之研究。資訊管理研究,6,1-29。  延伸查詢new window
15.樊國禎、方仁威、鐘乃業、林勤經(2002)。適當保護個人隱私的金鑰代管/回復式密碼系統初探。電腦與通訊,99,28-36。  延伸查詢new window
16.陳志萍、陳志賢、何玲玲(2010)。電子化政府品牌關係發展之初探性研究。資訊傳播研究,1(1),67-87。new window  延伸查詢new window
17.Albrechtsen, E.(2007)。A qualitative study of users' view on information security。Computers & Security,26(4),276-289。  new window
18.Anderson, J. M.(2003)。Why we need a new definition of information security。Computers & Security,22(4),308-313。  new window
19.Aubert, B. A.、Rivard, S.、Patry, M.(2004)。A transaction cost model of IT outsourcing。Information & Management,41,921-932。  new window
20.Blumenberga, S.、Wagner, H. T.、Beimborn, D.(2009)。Knowledge transfer processes in IT outsourcing relationships and their impact on shared knowledge and outsourcing performance。International Journal of Information Management,9(5),342-352。  new window
21.Bouchaib, B.、Suzanne, R.(2003)。The information technology outsourcing risk: a transaction cost and agency theory-based perspective。Journal of Information Technology,18,211-221。  new window
22.Chow, T.、Cao, D. B.(2008)。A survey study of critical success factors m agile software projects。The Journal of Systems and Software,81(6),96l-971。  new window
23.Chow, W. S.(2004)。An exploratory study of the success factors for extranet adoption in e-supply chain。Journal of Global Information Management,12(1),60-67。  new window
24.Fenn, C.、Shooter, R.、Allan, K.(2002)。IT security outsourcing: How safe is your IT security?。Computer Law & Security Report,18(2),109-111。  new window
25.Ferreira, A. M. D.、Laurindo, F. J. B.(2009)。Outsourcing decision-making aspects considered by IT departments in Brazilian companies。International Journal of Production Economics,122,305-311。  new window
26.Finne, T.(2000)。Key concepts and business processes, computers & security。Information Systems Risk Management,19(3),234-242。  new window
27.Kahraman, Cengiz、Engin, Orhan、Kabak, Ozgur、Kaya, Ihsan(2009)。Information systems outsourcing decisions using a group decision-making approach。Engineering Applications of Artificial Intelligence,22(6),832-841。  new window
28.Khalfan, A. M.(2004)。Information security considerations in IS&IT outsourcing projects-a descriptive case study of two sectors。International Journal of information Management,24,29-42。  new window
29.Lai, I. K. W., Tong, V. W. L.、Lai, D. C. F.(2010)。Trust factors influencing the adoption of internet-based interorganizational systems。Electronic Commerce Research and Applications,10(1),85-93。  new window
30.Lee, J. N.、Kim, Y. G.(1997)。Information systems outsourcing strategies for affiliated firms of the Korean conglomerate groups。Journal of Strategic Information Systems,6(3),203-229。  new window
31.Leyden, J.(2004)。Clueless office workers help spread computer viruses。The Register,6,17-21。  new window
32.Ng, Boon-Yuen、Kankanhalli, Atreyi、Xu, Yunjie(2009)。Studying users' computer security behavior: A health belief perspective。Decision Support Systems,46(4),815-825。  new window
33.Tiwana, A.、Bush, A. A.(2007)。A Comparison of Transaction Cost, Agency, and Knowledge-Based Predictors of IT Outsourcing Decisions: A U.S.-Japan Cross-Cultural Field Study。Journal of Management Information Systems,24(1),259-300。  new window
34.Walker, G.、Poppo, R.(1991)。Profit centers, single-source suppliers, and transaction costs。Administrative Science Quarterly,36,66-87。  new window
35.Walt, V. D. A.(2003)。Managed Security Services-Who Needs it?。Computer Fraud and Security,8,15-17。  new window
36.Whitten, D.、Leidner, D.(2006)。Bringing IT back: an analysis of the decision to back source or switch vendors。Decision Sciences,37(4),605-621。  new window
37.Willers, R.(2002)。Managed Security Services-A Buyer's Guide。Network Security,2002(9),12-15。  new window
38.Workman, M.(2008)。Wisecrackers: A Theory-Grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security。Journal of the American Society for Information Science and Technology,59(4),662-674。  new window
39.Workman, M.、William, H. B.、Straub, D.(2008)。Security lapses and the omission of information security measures: A threat control model and empirical test。Computers in Human Behavior,24,2799-2816。  new window
40.Yeh, Q. J.、Chang, A. J. T.(2007)。Threats and countermeasures for information system security: A cross-industry study。Information & Management,44,480-491。  new window
會議論文
1.張俊陽、郭嘉偉、許鳳君(2008)。以延伸委外接受模式與交易成本理論探討影響員工接受資安委外服務。  延伸查詢new window
2.Choi, Y. S.、Seo, D. I.(2005)。An analysis of ISP's role as managed security service providers(MSSPs)624-626。  new window
3.Deshpande, D.(2005)。Managed security services: an emerging solution to security107-111。  new window
4.Acquisti, A.、Grossklas, J.(2003)。Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior。Berkeley: CA.。  new window
學位論文
1.李雅雯(2004)。中小企業資訊委外流程評估指標之研究(碩士論文)。銘傳大學。  延伸查詢new window
2.陳正坤(1997)。資訊系統發展之委外管理研究(碩士論文)。台灣大學。  延伸查詢new window
3.張登裕(2007)。資訊安全業務委外關鍵成功因素之研究--以國軍司令部(指揮部)層級為例。國防大學。  延伸查詢new window
4.許通安(2006)。政府機關資訊科技委外關鍵因素。中原大學。  延伸查詢new window
5.林群國(2008)。資訊委外成功因素之研究。世新大學。  延伸查詢new window
6.Straub, D.(1986)。Deterring Computer Abuse: The Effectiveness of Deterrent Countermeasures in the Computer Security Environment。  new window
圖書
1.Glaser, B. G.、Strauss, A. L.(1967)。Grounded Theory。New York:Aldine。  new window
2.Laudon, K. C.、Laudon, J. P.(2003)。Management information systems: Managing the digital firm。Prentice Hall。  new window
3.林東清(2002)。資訊管理--e化企業的核心競爭能力。台北市:智勝文化事業有限公司。  延伸查詢new window
4.黃俊英(1994)。企業研究方法。臺北:東華書局。  延伸查詢new window
5.林震岩(2006)。多變量分析:SPSS的操作與應用。臺北:智勝文化事業有限公司。  延伸查詢new window
6.Williamson, Oliver E.(1985)。The Economic Institutions of Capitalism: Firms Markets, Relational Contracting。Macmillan, Ltd:Free Press。  new window
7.Strauss, Anselm、Corbin, Juliet(1998)。Basics of Qualitative Research: Techniques and Procedures for Developing Grounder Theory。Sage。  new window
8.Kvale, Steinar(1996)。Inter Views: An introduction to qualitative research interviewing。Sage。  new window
9.財團法人資訊工業資策會(2008)。2008年台灣資訊委外市場將挑戰300億大關。台北。  延伸查詢new window
10.Schneier, B.(2000)。Secret and Lies, Digital Security in a Networked World。New York。  new window
其他
1.ISO27001(2005)。Information security management systems-Requirements。  new window
2.Peters, S.(2009)。14th CSI Computer Crime and Security Survey。  new window
3.Richardson, R.(2008)。13th CSI Computer Crime and Security Survey。  new window
圖書論文
1.Ding, W.、Yurcik, W.、Yin, X.(2005)。Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers。International Workshop on Internet and Network Economics (WINE)。Berlin, Heidelberg:Springer。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE