메뉴 건너뛰기




Volumn 15, Issue 4, 1996, Pages 297-316

The information security chain in a company

Author keywords

Information Security (ISEC); Information Security Chain (ISC); Risks

Indexed keywords

COMPUTER NETWORKS; INFORMATION MANAGEMENT; RISK ASSESSMENT;

EID: 0030417096     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/0167-4048(96)88941-3     Document Type: Article
Times cited : (15)

References (72)
  • 2
    • 85029983794 scopus 로고
    • Press on Printers, London
    • Audit Commission. Opportunity Makes the Thief. Press on Printers, London, 1994.
    • (1994) Opportunity Makes the Thief
  • 3
    • 26144445775 scopus 로고    scopus 로고
    • Ny teknik/data. Virus blir bara värre
    • Borgström, H. Ny Teknik/Data. Virus blir bara värre. Vecka 17, 1996, p 4.
    • (1996) Vecka , vol.17 , pp. 4
    • Borgström, H.1
  • 5
    • 0042217156 scopus 로고
    • Communications security
    • Caelli, W., Longley, D. & M. Shain. Stockton Press, New York
    • Caelli, William & Alan Tickle. Communications Security: In Caelli, W., Longley, D. & M. Shain. Information Security Handbook, Stockton Press, New York, 1991, pp 649-706.
    • (1991) Information Security Handbook , pp. 649-706
    • Caelli, W.1    Tickle, A.2
  • 7
    • 0042217155 scopus 로고
    • Portrait of the computer criminal
    • Information Security The Next Decade. Ed. J. Eloff & S. von Solms, South Africa 9-12 May
    • Carroll, J.M. Portrait of the Computer Criminal. In Information Security The Next Decade. Ed. J. Eloff & S. von Solms, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, South Africa 9-12 May 1995, pp 533-545.
    • (1995) Proceedings of the IFIP TC11 Eleventh International Conference on Information Security , pp. 533-545
    • Carroll, J.M.1
  • 11
    • 85029997004 scopus 로고
    • Schluss mit abhören
    • Computer Spectrum. Schluss mit Abhören. Nummer 9, 1990.
    • (1990) Computer Spectrum , vol.9
  • 12
    • 85029985355 scopus 로고
    • Computer fraud & security bulletin
    • 1995: Elsevier Advanced Technology, Oxford, August
    • Computer Weekly. 1995: In Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, August 1995, p 4.
    • (1995) Computer Weekly , pp. 4
  • 13
    • 85029987277 scopus 로고
    • Tallberg, anders. Artikelkompendium
    • Svenska Handelshögskolan, Helsingfors
    • Deborah Russell & G.T. Gangemi. 1991. In: Tallberg, Anders. Artikelkompendium. Datasäkerhet och adb-revision, Svenska Handelshögskolan, Helsingfors, 1994.
    • (1991) Datasäkerhet och Adb-revision
    • Russell, D.1    Gangemi, G.T.2
  • 14
    • 85029978090 scopus 로고
    • Republic of South Africa
    • Deloitte Touche Tohmatsu International. Information Protection and Client Server, Republic of South Africa, 1995, p 17.
    • (1995) Information Protection and Client Server , pp. 17
  • 15
    • 85029984657 scopus 로고
    • Republic of South Africa
    • Deloitte Touche Tohmatsu International. Computer Assurance Services, Republic of South Africa, 1995.
    • (1995) Computer Assurance Services
  • 16
    • 0042217154 scopus 로고
    • Security management and policy
    • Caelli, W. Longley, D., & Shain M. Stockton Press, New York
    • Dorey, Paul. Security Management and Policy: In Caelli, W. Longley, D., & Shain M. Information Security Handbook, Stockton Press, New York, 1991, pp 27-74.
    • (1991) Information Security Handbook , pp. 27-74
    • Dorey, P.1
  • 17
    • 0042718169 scopus 로고
    • Fraud prevention and computer security for financial institutions-part 2
    • Elsevier Advanced Technology, Oxford, March
    • Essinger, James. Fraud Prevention and Computer Security for Financial Institutions-Part 2, Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, March 1995, pp 16-19.
    • (1995) Computer Fraud & Security Bulletin , pp. 16-19
    • Essinger, J.1
  • 19
    • 85029992437 scopus 로고
    • Information security: Vital for competitive advantages
    • South Africa, Cape Town
    • Finne, Thomas. Information Security: Vital for Competitive Advantages. Paper presented at the IFIP WG 11.1 Workshop. South Africa, Cape Town, 8.5.1995.
    • (1995) IFIP WG 11.1 Workshop , vol.8 , Issue.5
    • Finne, T.1
  • 21
    • 0042217148 scopus 로고
    • Finnish Sun user group
    • FISUGbytes. Finnish Sun user group, No.3. 1994.
    • (1994) FISUGbytes , vol.3
  • 24
    • 33744978877 scopus 로고
    • Information security issues in mobile computing
    • Information Security The Next Decade. Ed. J. Eloff & S. von Solms. South Africa 9-12 May
    • Hardjono, Thomas & Jennifer Seberry. Information Security Issues in Mobile Computing: In Information Security The Next Decade. Ed. J. Eloff & S. von Solms. Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, South Africa 9-12 May 1995, pp 125-134.
    • (1995) Proceedings of the IFIP TC11 Eleventh International Conference on Information Security , pp. 125-134
    • Hardjono, T.1    Seberry, J.2
  • 27
    • 0028732047 scopus 로고
    • Elsevier Advanced Technology, Oxford
    • Highland, Harold. Random Bits and Bytes, Computers & Security, Volume 13, Number 6, Elsevier Advanced Technology, Oxford, 1994, pp 458-465.
    • (1994) Random Bits and Bytes, Computers & Security , vol.13 , Issue.6 , pp. 458-465
    • Highland, H.1
  • 28
    • 85029980542 scopus 로고
    • Encryption policy for the global information infrastructure
    • Information Security The Next Decade. Ed. J. Eloff & S. von Solms. South Africa 9-12 May
    • Hoffman, Lance. Encryption Policy for the Global Information Infrastructure: In Information Security The Next Decade. Ed. J. Eloff & S. von Solms. Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, South Africa 9-12 May 1995, pp 50-63.
    • (1995) Proceedings of the IFIP TC11 Eleventh International Conference on Information Security , pp. 50-63
    • Hoffman, L.1
  • 32
    • 84884719062 scopus 로고
    • University of Oulu, Department of Information Processing Science, Working paper, Oulu
    • Kajava, Jorma & Jussipekka Leiwo. Tietoturvahenkilöstö organisaatiossa. University of Oulu, Department of Information Processing Science, Working paper, Oulu, 1994.
    • (1994) Tietoturvahenkilöstö Organisaatiossa
    • Kajava, J.1    Leiwo, J.2
  • 35
    • 0029214744 scopus 로고
    • Biometrics, is it a viable proposition for identity authentication and access control?
    • Elsevier Advanced Technology, Oxford
    • Kim, Hyun-Jung. Biometrics, is it a Viable Proposition for Identity Authentication and Access Control? Computers & Security, Volume 14, No. 3, 1995, pp 205-214, Elsevier Advanced Technology, Oxford.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 205-214
    • Kim, H.-J.1
  • 37
    • 0042718176 scopus 로고
    • Tietoturvauutiset
    • LAN Vision Oy. Tietoturvauutiset. No. 1, 1995, p 4.
    • (1995) LAN Vision Oy , vol.1 , pp. 4
  • 41
    • 0043219343 scopus 로고
    • Access control
    • Caelli, William., Longley, D. & Shain, M. Stockton Press, New York
    • Longley, Dennis. Access Control: In Caelli, William., Longley, D. & Shain, M. Information Security Handbook, Stockton Press, New York, 1991, pp 455-544.
    • (1991) Information Security Handbook , pp. 455-544
    • Longley, D.1
  • 43
    • 85029987475 scopus 로고
    • Elsevier Advanced Technology, Oxford, December
    • Maynard, Jeff. Computer Audit Update, Elsevier Advanced Technology, Oxford, December 1994, pp 15-18.
    • (1994) Computer Audit Update , pp. 15-18
    • Maynard, J.1
  • 44
    • 85030000795 scopus 로고
    • Mikrodatorns testredaktion
    • Mikrodatorn. Mikrodatorns testredaktion. Säkra data med billig backup. No.1. 1993, pp 41-42, 47.
    • (1993) Säkra Data Med Billig Backup , vol.1 , pp. 41-42
  • 51
    • 85029999429 scopus 로고
    • Elsevier Advanced Technology, Oxford, August
    • Ongetta, Silvano. Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, August 1994, pp 13-15.
    • (1994) Computer Fraud & Security Bulletin , pp. 13-15
    • Ongetta, S.1
  • 52
    • 85067946532 scopus 로고    scopus 로고
    • Hitting the wall: Errors in developing and debugging a "simple" spreadsheet model
    • Ed. Jay F. Nunamaker Jr. & Ralph H. Sprague Jr.
    • Panko, Raymond. Hitting the Wall: Errors in Developing and Debugging a "Simple" Spreadsheet Model. In Proceedings of the Twenty-Ninth Annual Hawaii International Conference on System Sciences. Ed. Jay F. Nunamaker Jr. & Ralph H. Sprague Jr. 1996, Vol II, pp 356-363.
    • (1996) Proceedings of the Twenty-ninth Annual Hawaii International Conference on System Sciences , vol.2 , pp. 356-363
    • Panko, R.1
  • 54
    • 85029987024 scopus 로고
    • The mother of all safeguards
    • Elsevier Advanced Technology, Oxford, July
    • Parker, Donn B. The Mother of all Safeguards, Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, July 1995, pp 10-12.
    • (1995) Computer Fraud & Security Bulletin , pp. 10-12
    • Parker, D.B.1
  • 65
    • 0029214917 scopus 로고
    • Business continuity planning
    • Elsevier Advanced Technology, Oxford
    • Smith, Martin & John Sherwood. Business Continuity Planning, Computers & Security, Volume 14, Number 1, Elsevier Advanced Technology, Oxford, 1995, pp 14-23.
    • (1995) Computers & Security , vol.14 , Issue.1 , pp. 14-23
    • Smith, M.1    Sherwood, J.2
  • 67
    • 0042217097 scopus 로고
    • Security in distributed and client/server systems - A management view
    • Elsevier Advanced Technology, UK
    • Symonds, Ian M. Security in Distributed and Client/Server Systems - a Management View, Computers & Security, Volume 13, No. 6, Elsevier Advanced Technology, UK, 1994, pp 473-480.
    • (1994) Computers & Security , vol.13 , Issue.6 , pp. 473-480
    • Symonds, I.M.1
  • 69
    • 0041716718 scopus 로고
    • Information security accreditations - The ISO 9000 route
    • Information Security The Next Decade. Ed. J. Eloff & S. von Solms, South Africa 9-12 May
    • Von Solms, Rossouw & L.R. Meyer. Information Security Accreditations - The ISO 9000 Route: In Information Security The Next Decade. Ed. J. Eloff & S. von Solms, Proceedings of the IFIP TC11 Eleventh International Conference on Information Security, South Africa 9-12 May 1995, pp 40-49.
    • (1995) Proceedings of the IFIP TC11 Eleventh International Conference on Information Security , pp. 40-49
    • Von Solms, R.1    Meyer, L.R.2
  • 71
    • 0043219327 scopus 로고
    • Information security awareness raising methods
    • Elsevier Advanced Technology, Oxford, June
    • Wood, Charles C. Information Security Awareness Raising Methods, Computer Fraud & Security Bulletin, Elsevier Advanced Technology, Oxford, June 1995, pp 13-15.
    • (1995) Computer Fraud & Security Bulletin , pp. 13-15
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.