:::

詳目顯示

回上一頁
題名:國外政府機構資訊系統安全稽核制度
書刊名:存款保險資訊季刊
作者:吳琮璠 引用關係
出版日期:1996
卷期:10:2
頁次:頁21-40
主題關鍵詞:政府機構資訊系統安全稽核制度
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(4) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:4
  • 共同引用共同引用:0
  • 點閱點閱:4
期刊論文
1.Straub, Detmar Jr.、Nance, William D.(1990)。Discovering and Disciplining Computer Abuse in organizations: A Field Study。MIS Quarterly: Management Information Systems,14(1),45-60。  new window
2.Whitmyer, Claude F.(1987)。Computer Security: Some Problems, Some Solutions。The Office,1987(Dec.),27。  new window
3.Weber, Austin(1985)。Effective Security Programs Start with Awareness。Data Management,1985(Nov.),34。  new window
4.Smid, Miles E.(1991)。Integrating the Data Encryption Standard into Computer Networks。IEEE Transactions on Communications,29(6),762-772。  new window
5.Southard, C. D. IV(1989)。Individual Privacy and Governmental Efficiency: Technology's Effect on the Government's Ability to Gather, Store, and Distribute Information。Computer/Law Journal,9,359-374。  new window
6.Menkus, Belden(1980)。Crime Prevention in System Design。Journal of Systems Management,1991(May),19。  new window
7.Chaum, David(1985)。Security Without Identification: Transaction Systems to Make Big Brother Obsolete。Communications of the ACM,28(10),1030-1044。  new window
8.Chaum, David(1992)。Achieving Electronic Privacy。Scientific American,1992(Aug.),96-101。  new window
9.Axner, David H.(1992)。Access and Authentication: Key Issues in Network Security。Business Communications Review,1992(Mar.),61-66。  new window
10.Clement, John(1987)。Rethinking Security。Government Data Systems,1987(Mar./Apr.),45-46。  new window
11.Danca, Richard A.(1992)。EPA Juggles LAN Security, Access。Federal Computer Week,1992(Jan.),34。  new window
12.Hains, David(1992)。LAN Security: Are You Taking It Seriously?。Computer Control Quality,10(1),7-11。  new window
13.Forcht, Karen A.(1985)。Data Security Concerns in the Microcomputer Environment。The journal of Data Education,1985(Summer),14-16。  new window
14.Forcht, Karen A.、Thomas, Daphyne、Wigginton, Karen(1987)。Computer Crime: Assessing the Lawyer's Perspective。Journal of Business Ethics,8(4),243-251。  new window
15.Fitzgerald, Kevin(1991)。Computer Crime Detection。Computer Control Quarterly,9(3),41-49。  new window
16.Mckibbin, Wendy(1983)。Who Gets the Blame for Computer Crime?。Infosystems,1983(Jul.),34-36。  new window
17.Loch, Karen D.、Carr, Houston H.、Warkentin, Merril(1991)。Why Won't Organizations Tell You About Computer Crime?。Information Management Bulletin,1991(Feb.),5-6。  new window
18.Laurance, Robert(1988)。Managing Security。Journal of Data Computer Communications,1988(Summer),77-79。  new window
19.Schwartz, Michael(1984)。Data Authentication。Data Security Management,84-03-06,1-12。  new window
20.Johnston, Robert E.(1989)。Solving the Mystery of Network Security。Access,1989(2nd Quarter),16-18。  new window
21.Smith, Cherie(1989)。Marketing Security Acquisition to Management。ISSA Access,1989(1st Quarter),10+42。  new window
圖書
1.Russell, Deborah、Gangemi, G. T. Jr.(1991)。Computer security basics。Sebastopol, California:O'Reilly and associates Inc.。  new window
2.Forcht, Karen A.(1994)。Computer Security Management。Danvers, MA:Boyd & Fraser。  new window
3.Schweitzer, James A.(1986)。Computer crime and Business Information. A Practical Guide for Managers。New York:Elsevier Publishing。  new window
4.Wofsey, Marvin M.(1983)。Advances in Computer Security Management。New York:John Wiley & Sons。  new window
5.行政院研考會(1995)。公務員之資訊法規須知。行政院研考會。  延伸查詢new window
6.吳琮璠(1992)。會計師辦理所得稅電腦查核工作底稿示範。  延伸查詢new window
7.(1994)。Systems Auditability and Control。Institute of Internal Auditors Research Foundation。  new window
8.葉誌崇(1985)。EDP審計之研究。國立成功大學會計系。  延伸查詢new window
9.陳淑卿(1994)。建立電腦稽核制度之研究。  延伸查詢new window
10.吳琮璠(1995)。審計部電腦審計作業規畫研究。  延伸查詢new window
11.吳琮璠(1993)。公司會計電腦化環境下查核規畫指引。  延伸查詢new window
12.李克蘇(1992)。北美地區金融業電腦稽核技術發展。  延伸查詢new window
13.張振芳(1992)。資訊先進國家金融業之電腦稽核及內部控制。  延伸查詢new window
14.李毓萍(1989)。銀行電腦稽核制度之改進與實施。  延伸查詢new window
15.Bloombecker, Jay(1986)。Computer Crime, Computer Security, Computer Ethics。Los Angeles:National Center for Computer Crime Data。  new window
16.CIPFA(1994)。Computer Audit Guidelines。  new window
17.Rullo, Thomas A.(1980)。Advances in Computer Security Management。Philadelphia, PA:Heyden。  new window
其他
1.陳章正(1989)。美國電腦稽核作業及災害復原計畫考察報告。  延伸查詢new window
2.郭學武(1991)。電腦稽核與應用研習報告。  延伸查詢new window
圖書論文
1.Debutts, John(1987)。Securing Our Future Through Technology。Computer Security Issues and Trends。Computer Security Institute。  new window
2.Davies, Donald(1987)。Confidentiality, Integrity, and Continuity。Computer Security Issues and Trends。Computer Security Institute。  new window
3.Kesim, Susan N.。Securing Computer: A Checklist。Security Systems。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE