:::

詳目顯示

回上一頁
題名:Study of Enterprise Architecture Modeling for Information Security Risk Management of Personal Information Protections
書刊名:全球商業經營管理學報
作者:馬維銘 引用關係謝孟洵
作者(外文):Ma, Wei-mingHsieh, Meng-hsun
出版日期:2018
卷期:10
頁次:頁37-48
主題關鍵詞:企業架構塑模資訊安全風險管理Enterprise architectureModelingInformation securityRisk management
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:1
  • 點閱點閱:9
隱私問題是全球企業風險所面臨的最大挑戰之一。本研究應用以企業架構為中心的卓越方法論透過專案準備、系統盤點、企業塑模、企業模型分析、審核與驗證、分析轉換等步驟,對個人資訊保護資訊安全風險管理進行塑模。本研究達到資訊安全風險管理的目標:合理配置企業資源、實現企業資訊安全高績效及降低企業資訊安全風險。
The privacy issue is one of the biggest challenges in the global enterprises' risks. We applied the Enterprise Architecture Center of Excellent methodology to model Information Security Risk Management of Personal Information Protection by project preparation, systems inventory, enterprise modeling, enterprise model analysis, review & verification, analysis transition. This research reached the goals of the information security risk management: appropriate allocation of enterprise's resources, high performance of enterprise's information security, and reduce risks of enterprise's information security.
期刊論文
1.馬維銘(20130900)。Study on Enterprise Architecture Development。全球商業經營管理學報,5,57-71。new window  延伸查詢new window
2.Ma, Wei-Ming、Lee, James(2015)。Study of Implementation of Enterprise Database Activity Monitoring Agile Projects。Journal of Global Business Operation and Management,7,95-108。new window  new window
3.Tzou, Wan-Lian、Hwang, ming-da(2012)。A study of introducing college personal information management system based on BS 10012。Computer Audit,25,72-88。  new window
4.Ma, Wei-Ming(2010)。Study on Architecture-Oriented Information Security Risk Assessment Model。Computational Collective Intelligence Technologies and Applications,6423,218-226。  new window
會議論文
1.Ma, Wei-ming、Tsai, Cheng F.(2012)。Study of Implementation of the Personal Information Protection Act Architecture on CSU Campus。2012 Symposium on Global Business Operation and Management。Kaohsiung。  new window
2.Li, Fu-Shiau、Ma, Wei-Ming、Chao, Architect(2008)。Architecture Centric Approach to Enhance Software Testing Management。Eighth International Conference on Intelligent Systems Design and Applications,654-659。  new window
3.Ma, Wei-ming(2016)。A comparative study of information security risk management Enterprise architecture and architecture-oriented model。2016 International Conference on Business and Information。Osaka。  new window
4.Ma, Wei-ming(2017)。Systems Architecture of Information Security Applications and Services IoT System General Architectural Theory at Work。BAI Winter 2017。Bangkok。105-133。  new window
圖書
1.Bernard, Scott A.(2012)。An Introduction To Enterprise Architecture。Bloomington, IN:Author House。  new window
2.Lankhorst, Marc(2013)。Enterprise Architecture at Work: Modeling, Communication and Analysis。New York:Springer。  new window
3.Chao, William S.(2012)。Systems Architecture: SBC Architecture at Work。Taipei:LAP LAMBERT Academic Publishing。  new window
4.Chao, William S.(2016)。Systems Architecture of Smart Healthcare Cloud Applications and Services IoT System: General Architectural Theory at Work。Amazon Digital Services LLC。  new window
5.Chao, William S.(2016)。Systems Architecture of Smart Home Security Cloud Applications and Services IoT System: General Architectural Theory at Work。Amazon Digital Services LLC。  new window
6.Ahlemann, Frederik、Stettiner, Eric、Messerschmidt, Marcus、Legner, Christine(2012)。Strategic Enterprise Architecture Management: Challenges, Best Practices, and Future Developments。New York:Springer。  new window
7.Holcman, Samuel B.(2013)。Reaching the Pinnacle。Pinnacle Business Group。  new window
8.IIBA(2015)。A Guide to the Business Analysis Body of Knowledge, BABOK Guide。International Institute of Business Analysis.。  new window
9.PMI(2017)。A Guide to the Project Management Body of Knowledge: PMBOK® Guide。Project Management Institute。  new window
10.Research, Development and Evaluationm Commission, Executive Yuan, ROC(2012)。The Personal Information Protection Technical procedures。  new window
11.Yayici, Emrah(2015)。Business analysis methodology book。Emrah Yayici。  new window
其他
1.Chao, William S.(2018)。SBC View Model,https://sites.google.com/site/sbcaritecture/home/sbc-view-model。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關博士論文
 
無相關書籍
 
無相關著作
 
QR Code
QRCODE