:::

詳目顯示

回上一頁
題名:企業資訊安全投資之決策變數探討
書刊名:品質學報
作者:詹前隆 引用關係曾淑芬呂志鴻
作者(外文):Chanu, Chien-lungTseng, Shu-fenLu, Chih-hung
出版日期:2013
卷期:20:4
頁次:頁379-401
主題關鍵詞:資訊安全投資決策資安風險指標風險認知Information securityInvestment decisionInformation security risk indexRisk perception
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:81
  • 點閱點閱:31
層出不窮的資安事件造成企業的龐大損失並嚴重傷害公司聲譽。本研究旨在探討影響企業資訊安全投資之決策變數。資訊安全投資項目,包括資安人力、軟體、硬體、管理、委外與服務等。針對臺灣企業內資訊相關的從業人員,以專家訪談與問卷設計收集資料。從外在環境與內部組織等不同構面出發,以統計複迴歸分析企業資訊安全投資的影響因素與影響程度。研究結果發現外部環境因素對資訊安全投資影響不顯著。而影響資訊安全投資之變數依序為「高階主管對資安控管的態度」、「資訊安全風險認知」、「企業規模」與「組織資訊科技的應用程度」。企業宜提昇高階主管對資安控管之態度與風險認知以強化資訊安全之投資。面對管控資安風險與成本效益的兩難,建議導入決策分析架構以提升決策品質。
The increased in information security issues have caused great amount losses to enterprises and have damaged the reputation of those enterprises. In coping with a variety of information security issues, enterprises are always in a dilemma when they need to make investment decisions for information security infrastructure. Managers need to achieve both goals of risk control and cost effectiveness. The aim of this research is to examine the variables influencing enterprises' information security investment decisions. We collected data from decision makers involved in information technology investment through interviews and questionnaires. Factors affecting enterprises information security investment were classified into internal and external factors such as information security manpower, software, hardware, management, outsourcing, and services. Using regression analysis, variables influencing information security investments were found. External environmental factors have no significant effect on enterprises information security investment. Variables that can predict "information security investment" by the order of beta coefficients are: "the senior executives' attitude toward control of information security," "information security risk index," "the scale of enterprise," and "the degree of enterprises' technology application." Consequently, enterprises need to empower the top management to control information security and risk perception to improve the quality of information security decision making. Decision analysis framework is recommended to tradeoff the information security risk control and cost effectiveness of information security investment.
期刊論文
1.李東峰、林子銘(20020700)。資訊主管對企業資訊安全之風險控管決策。資訊管理研究. 中央大學,4(2),1-42。new window  延伸查詢new window
2.洪國興、季延平、趙榮耀(20031000)。資訊安全評估準則層級結構之研究。圖書館學與資訊科學,29(2),22-44。new window  延伸查詢new window
3.Bacon, C. J.(1992)。The use of decision criteria in selecting information system/technology investment。MIS Quarterly,16(3),335-353。  new window
4.Bodin, L. D.、Gordon, L. A.、Loeb, M. P.(2008)。Information security and risk management。Communications of the ACM,51(4),64-68。  new window
5.Bojanc, R.、Jerman-Blazic, B.(2008)。An economic modeling approach to information security management。International Journal of Information Management,28(5),413-422。  new window
6.Briney, A.、Prince, F.(200207)。2002 ISM Survey。Information Security Magazine,September,36-54。  new window
7.Cavusoglu, H.、Mishra, B.、Raghunathan, R.(2004)。A model for evaluating IT security investments。Communications of the ACM,47(7),87-92。  new window
8.Chai, S.、Kim, M.、Rao, H. R(2011)。Firms ‘information security investment decisions: stock market evidence of investors’ behavior。Decision Support System,50(4),651-661。  new window
9.Chan, C. L.(2011)。Information security risk modeling using bayesian index。The Computer Journal,54(4),628-638。  new window
10.Chang, S. E.、Ho, C. B.(2006)。Organizational factors to the effectiveness of implementing information security management。Industrial Management and Data Systems,106(3),345-361。  new window
11.Chien, C.-F.、Yu, C.-M.、Hsu, S.-C.(2009)。UNISON decision analysis framework for constructing the workforce planning decision model for semiconductor manufacturing fab。Journal of Management and Systems,16(2),157-180。  new window
12.Fung, Andrew Ren-Wei、Farn, Kwo-Jean、Lin, Abe C.(2003)。A study on the certification of the information security management systems。Computer Standards and Interfaces,25(5),447-461。  new window
13.Gordon, L. A.、Loeb, M. P.(2006)。Budgeting process for information security expenditures。Communications of the ACM,49(1),121-125。  new window
14.Janz, B.、Dibrell, C.(1998)。The implementation of strategy in an innovative information service organization: an empirical comparison of theoretical frameworks。Journal of Information Technology Management,9(3),1-20。  new window
15.Mclvor, R.、McHugh, M.(2000)。Partnership Sourcing: an organization chang management perspective。The Journal of Supply Chain Management,36(3),12-20。  new window
16.Mercuri, R. T.(2003)。Analyzing security costs。Communications of the ACM,46(6),15-18。  new window
17.Mohan-Neill, S.(2006)。Online market information and environmental scanning activity by small business: the correlation between firms characteristics and online market information acquisition。Academy of Entrepreneurship Journal,12(2),85。  new window
18.Pemberton, J. D.、Stonehouse, G. H.、Barber, C. E.(2001)。Competing with CRS-generated information in the airline industry。Journal of Strategic Information Systems,10(1),59-76。  new window
19.Premkumar, G.、King, W. R.(1994)。Organizational characteristics and information systems planning: an empirical study。Information Systems Research,5(2),75-104。  new window
20.Purser, S. A.(2004)。Improving the ROI of the security management Process。Computer and Security,23(7),542-546。  new window
21.Gordon, Shelley S.、Stewart, Wayne H. Jr.、Sweo, Robert、Luker, William A.(2000)。Convergence versus strategic reorientation: the antecedents of fast-paced organizational change。Journal of Management,26(5),911-945。  new window
22.Sonnenreich, W.、Albanese, J.、Stout, B.(2006)。Return on security investment (ROSI) aractical quantitative model。Journal of Research and Practice in Information Technology,38(1),45-56。  new window
23.Tallon, P. P.、Kraemer, K. L.、Grbaxani, V.(2000)。Executives' perceptions of the business value on information technology: a process-oriented approach。Journal of Management Information Systems,16(4),145-173。  new window
24.Vermeulen, C.、Von Solms, R.(2002)。The information security management toolbox-taking the pain out of security management。Information Management and Computer Security,10(3),119-125。  new window
25.Von Solms, B.、Von Solms, R.(2004)。The 10 deadly sins of information security management。Computers and Security,23(5),371-376。  new window
26.Chien, C.-F.、Wang, H.-J.、Wang, M.(2007)。A UNISON Framework for Analyzing Alternative Strategies of IC Final Testing for Enhancing Overall Operational Effectiveness。International Journal of Production Economics,107(1),20-30。  new window
27.Weill, Peter、Olson, Margrethe H.(1989)。Managing Investment in Information Technology: Mini Case Examples and Implications。MIS Quarterly: Management Information Systems,13(1),3-17。  new window
28.Jarvenpaa, Sirkka L.、Ives, B.(1991)。Executive involvement and participation in the management of information technology。MIS Quarterly,15(2),205-227。  new window
29.Porter, Michael E.(1998)。Clusters and the New Economics of Competition。Harvard Business Review,76(6),77-90。  new window
30.Kotulic, A. G.、Clark, J. G.(2004)。Why there aren't more information security research studies?。Information and Management,41(5),597-607。  new window
31.Thong, J. Y. L.(1999)。An integrated model of information systems adoption in small businesses。Journal of Management Information Systems,15(4),187-214。  new window
32.鄧家駒(1998)。風險管理。保險專刊,51,100-113。  延伸查詢new window
33.Wu, Jei-Zheng、Chien, Chen-Fu(2008)。Modeling Strategic Semiconductor Assembly Outsourcing Decisions Based on Empirical Settings。OR Spectrum,30(3),401-430。  new window
34.Straub, Detmar W. Jr.、Welke, Richard J.(1998)。Coping with Systems Risk: Security Planning Models for Management Decision Making。MIS Quarterly,22(4),441-469。  new window
35.Miller, J.、Doyle, B. A.(1987)。Measuring effectiveness of computer-based information systems in the financial service sector。MIS Quarterly,11(1),107-125。  new window
36.Kelly, D.、Amburgey, T. L.(1991)。Organizational Inertia and Momentum: A Dynamic Model of Strategic Change。Academy of Management Journal,34(3),591-612。  new window
37.Gatignon, H.、Robertson, T. S.(1989)。Technology diffusion: an empirical test of competitive effects。Journal of Marketing,53(1),35-49。  new window
38.Teo, T. S. H.、Ang, J. S. K.(1999)。Critical success factors in the alignment of IS plans with business plans。International Journal of Information Management,19(2),173-185。  new window
39.Mata, Francisco J.、Fuerst, William L.、Barney, Jay B.(1995)。Information Technology and Sustained Competitive Advantage: A Resource-Based Analysis。MIS Quarterly,19(4),487-505。  new window
40.Bharadwaj, A. S.(2000)。A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation。MIS Quarterly,24(1),169-196。  new window
41.簡禎富、陳勁甫、陳建宏(20090400)。Designing Performance Indices and a Novel Mechanism for Evaluating Government R&D Projects。品質學報,16(2),119-135。new window  new window
42.Ravichandran, T.、Lertwongsatien, C.(2005)。Effect of Information Systems Resources and Capabilities on Firm Performance: A Resource-based Perspective。Journal of Management Information Systems,21(4),237-276。  new window
43.Thong, J. Y. L.、Yap, C. S.(1995)。CEO characteristics, organizational characteristics and information technology adoption in small businesses。Omega: The International Journal of Management Science,23(4),429-442。  new window
44.Klapper, Leora F.、Love, Inessa(2004)。Corporate Governance, Investor Protection, and Performance in Emerging Markets。Journal of Corporate Finance,10(5),703-728。  new window
研究報告
1.財團法人資訊工業策進會(2010)。資訊服務產業年鑑研究報告。  延伸查詢new window
學位論文
1.李東峰(2003)。企業資訊安全控管決策之研究  從組織決策理論觀點探討(博士論文)。國立中央大學,桃園,臺灣。new window  延伸查詢new window
2.賴志明(2008)。夥伴的信任-承諾關係對於電子商務策略規劃的影響(博士論文)。國立臺灣科技大學。  延伸查詢new window
圖書
1.吳明隆(2006)。SPSS統計應用學習實務:問卷分析與應用統計。臺北:易習圖書。  延伸查詢new window
2.李順仁(2007)。資訊安全。臺北:文魁資訊。  延伸查詢new window
3.樊國楨(2005)。資訊安全風險管理。臺北:行政院國家科學委員會科學技術資料中心。  延伸查詢new window
4.羅英嘉(2008)。CISSP與資訊安全基礎技術。臺北:財團法人資訊工業策進會。  延伸查詢new window
5.Clemen, R. T.(1996)。Making Hard Decisions: An Introduction to Decision Analysis。Duxbury Press。  new window
6.Saaty, T. L.(1998)。The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation。New York:McGraw-Hill International Book Co.。  new window
7.Von Winterfeld, D.、Edwards, W. E.(1986)。Decision Analysis and Behavioral Research。Cambridge University Press。  new window
8.Keeney, Ralph L.、Raiffa, Howard(1993)。Decisions with Multiple Objectives: Preferences and Value Tradeoffs。Cambridge University Press。  new window
9.簡禎富(2005)。決策分析與管理:全面決策品質提升之架構與方法。雙葉書廊。new window  延伸查詢new window
10.吳明隆(2009)。SPSS操作與應用:問卷統計分析實務。五南圖書出版股份有限公司。  延伸查詢new window
其他
1.行政院主計處電子處理資料中心(2010)。資通安全外部稽核。  延伸查詢new window
2.IBM X-Force(2010)。Mid-Year Trend and Risk Report,http://public.dhe. ibm.com/common/ssi/ecm/en/wgl03003usen/WGL03003USEN.PDF, 2013/08。  new window
圖書論文
1.Ajzen, Icek(1985)。From intentions to actions: A theory of planned behavior。Action Control: From Cognition to Behavior。Springer-Verlag。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE