:::

詳目顯示

回上一頁
題名:以系統動力學探討電腦病毒防治政策
書刊名:資訊管理學報
作者:宋佩貞古政元 引用關係陳加屏 引用關係
作者(外文):Sung, Pei-chenKu, Cheng-yuanChen, Chia-ping
出版日期:2012
卷期:19:3
頁次:頁621-652
主題關鍵詞:電腦病毒傳播系統動力學傳染病散播模型電腦病毒防治政策Computer virus propagationSystem dynamicsEpidemic modelAnti-virus policy
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:7
  • 點閱點閱:33
電腦病毒防治乃是資訊安全政策的核心任務之一,然而現今防範電腦病毒的研究多集中在技術面,在實證研究部份則因資料數據取得困難,故較少探討。為彌補此缺口,本研究採用系統動力學的方法,建立電腦病毒傳播的動態模式,藉以探討用戶端防毒政策的成效。多數研究認為定期更新病毒碼或成立資訊安全事件通報小組,能有效遏止電腦病毒散播,除此之外我們更進一步確認下述現象:(1)電腦接觸外來媒介的頻繁對於電腦病毒感染速率具高度敏感;(2)透過用戶端通報異常狀況存在著時間滯延,因此較不能快速減緩電腦病毒的散播;(3)自動通報機制可以有效控制高峰期的已感染電腦數量並縮短疫情持續時間,故防治效果比較佳;(4)公共衛生政策裡的隔離措施亦可有效抑制電腦病毒的傳播。
Anti-virus action is the core of information security policy. Many researchers focus on the technology of anti-virus, but not on the anti-virus policies because of the difficulty for obtaining data in empirical research. The research goal of this paper is to explore and evaluate the effectiveness of anti-virus policies by using the System Dynamic Model. Most computer users think that updating the virus pattern files regularly or setting up the security incident reporting team can effectively control the spread of computer viruses. However, the research results of this study indicate: (1) computer virus infection rate is very sensitive to the frequency of contact with other media; (2) relying on the manual reporting mechanism of clients will delay the development of anti-virus vaccine; therefore, this method can slow down the spread of computer virus a little; (3) automatic reporting system can effectively control the number of infected computers and shorten the duration of infection peak; (4) isolation policies can effectively reduce the spread of computer virus.
期刊論文
1.Sterman, J. D.、Wittenberg, J.(1999)。Path Dependence, Competition, and Succession in the Dynamics of Scientific Revolution。Organization Science,10(3),322-341。  new window
2.Silva, L.、Backhouse, J.(2003)。The Circuits-of-power Framework for Studying Power in Institutionalization of Information Systems。Journal of the Association for Information Systems,4(6),294-336。  new window
3.蘇建源、江琬瑂、阮金聲(20101000)。資訊安全政策實施對資訊安全文化與資訊安全有效性影響之研究。資訊管理學報,17(4),61-87。new window  延伸查詢new window
4.Kotulic, A. G.、Clark, J. G.(2004)。Why there aren't more information security research studies?。Information and Management,41(5),597-607。  new window
5.黃經洲、陳加屏、艾昌瑞(20091200)。以系統動力學模擬登革熱擴散現象與評估防治策略效果--臺南市為例。臺灣公共衛生雜誌,28(6),541-551。new window  延伸查詢new window
6.林宜隆、黃讚松(2001)。網路犯罪學之探討。中央警察大學學報,38,325-348。new window  延伸查詢new window
7.黃士銘、張碩毅、蘇耿弘(2005)。企業導入BS7799資訊安全管理系統之關鍵成功因素--以石化產業為例。資訊管理學報,13(2),171-192。new window  延伸查詢new window
8.Mishra, B.K.、Pandey, S.K.(2010)。Fuzzy epidemic model, for the transmission of worms in computer network。Nonlinear Analysis: Real World Applications,11(5),4335-4341。  new window
9.Piqueira, J.R.C.、Araujo, V.O.(2009)。A modified epidemiological model for computer viruses。Applied Mathematics and Computation,213(2),355-360。  new window
10.Wang, F.、Zhang, Y.、Wang, C.、Ma, J.、Moon, S.(2010)。Stability analysis of a SEIQV epidemic model for rapid spreading worms。Computers & Security,29(4),410-418。  new window
11.Wierman, J.C.、Machette, D.J.(2004)。Modeling computer virus prevalence with a Susceptible-Infected-Susceptible model with reintroduction。Computational Statistics & Data Analysis,45(1),3-23。  new window
12.Yuan, H.、Chen, G.、Wu, J.、Xiong, H.(2009)。Towards controlling virus propagation in information systems with point-to-group information sharing。Decision Support Systems,48(1),57-68。  new window
13.Albrechtsen, E.、Hovden, J.(2009)。The information security digital divide between information security managers and users。Computers & Security,28(6),476-490。  new window
14.Hoppensteeadt, R、Waltman, P.(1970)。A problem in the theory of epidemics。Mathematical Biosciences,9,71-91。  new window
15.Post, G.、Kagan, A.(2000)。Management tradeoffs in anti-virus strategies。Information & Management,37(1),13-24。  new window
16.Qing, S.、Wen, W.(2005)。A survey and trends on Internet worms。Computer & Security,24(4),334-346。  new window
17.Smith, S.、Winchester, D.、Bunker, D.、Jamieson, R.(2010)。Circuits of power: a study of mandated compliance to an information systems security De Jure standard in a government organization。MIS Quarterly,34(3),463-486。  new window
18.Sterman, J.D.(1989)。Modeling management behavior。misperceptions of feedback in a dynamics decision making experiment,35(3),321-339。  new window
會議論文
1.Chen, Z.、Gao, L.、Kwiat, K.(2003)。Modeling the spread of active worms。San Francisco, California, USA。1890-1900。  new window
2.Cho, K.、Lee, J.、Lim, J.、Moon, J.(2007)。Verification method of network simulation for pervasive environments。France。155-161。  new window
3.Cohen, F.(1984)。Computer viruses theory and experiments。Gaithersburg, Maryland, USA。240-263。  new window
4.Kephart, J.O.、White, R.S.(1991)。Directed-graph epidemiological models of computer virus。Oakland, California, USA。343-359。  new window
5.Kephart, J.O.、White, R.S.(1993)。Measuring and modeling computer virus prevalence。Oakland, California, USA。2-15。  new window
6.Yang, Y、Fang, Y.、Li, L.Y.(2008)。The analysis of propagation model for Internet worm based on active vaccination。Jinan, China。682-688。  new window
7.Zou, C.C.、Gong, W.、Towsley, D.(2002)。Code red worm propagation modeling and analysis。Washington, DC, USA。138-147。  new window
學位論文
1.張宏琳(2007)。網路蠕蟲傳播過程的系統動力學模型研究。中國陝西師範大學,中國。  延伸查詢new window
2.郭家宏(2005)。從組織決策觀點探討資訊安全控管程度及其有效性之研究--以企業資訊部門為例。國立東華大學,花蓮縣。  延伸查詢new window
3.蔡思達(2007)。以適應性結構化理論探討資説安全管理系統導入之徵用過程與成效。國立臺灣科技大學,臺北市。  延伸查詢new window
圖書
1.Sterman, J. D.(2000)。Business Dynamics--System Thinking and Modeling for a Complex World。Irwin McGraw-Hill。  new window
2.蘇懋康(1988)。系統動力學原理及應用。上海:上海交通大學出版社。  延伸查詢new window
3.Forrester, Jay Wright(1961)。Industrial dynamics。M.I.T. Press。  new window
4.Senge, Peter、郭進隆、齊若蘭(1990)。第五項修練:學習型組織的藝術與實務。台北:天下文化。  延伸查詢new window
5.Anderson, R. M.、May, R. M.(1991)。Infectious Diseases of Humans: Dynamics and Control。Oxford:Oxford University Press。  new window
6.Bailey, N.T.J.(1975)。The Mathematical Theory of Infectious Diseases and its Application。London。  new window
7.Ferbrache, David(1992)。A Pathology of Computer Viruses。London:Springer-Verlag。  new window
8.CSI,(1999)。Computer Crime & Security Survey。  new window
9.Hruska, J.(1990)。Computer Viruses and Anti-virus Warfare。New York。  new window
10.CSI,(2009)。Computer Crime & Security Survey Executive Summary。  new window
11.DTI,(2004)。Information Security Breaches Survey。  new window
12.Ludwig, M.A.(1996)。The Little Black Book of Computer Viruses。Arizona, USA。  new window
13.Peter, S.(2005)。The Art of Computer Virus Research and Defense。Boston。  new window
14.Stallings, W.(2006)。Cryptography and Network Security Principles and Practices。New Jersey。  new window
15.Whitman, M.E.、Mattord, H.J.(2008)。Management of Information Security。Boston。  new window
16.Farmer, J.D.、Belin, A.d'A.(1991)。Artificial life: the coming evolution。Artificial Life II。California。  new window
17.Murray, W.H.(1990)。The application of epidemiology to computer viruses。The Computer Virus Handbook。Oxford。  new window
其他
1.行政院主計處(2010)。98年電腦應用概況報告,http://www.dgbas.gov.tw/ct.asp?xItem=28145&CtNode=5526&mp=1, 20110118。  延伸查詢new window
2.ISO(2005)。ISO/IEC 27001 information technology--code of practice for information。  new window
3.ISO(2005)。ISO/IEC 27001 information technology--security techniques--information security management systems-requirements。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top