메뉴 건너뛰기




Volumn 9, Issue 4, 2001, Pages 183-197

Embedding security practices in contemporary information systems development approaches

Author keywords

Development; Information systems; Security

Indexed keywords

COMPUTER HARDWARE; COMPUTER SOFTWARE; INFORMATION TECHNOLOGY; MANAGEMENT INFORMATION SYSTEMS; PERSONNEL; SOCIETIES AND INSTITUTIONS;

EID: 0035780469     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220110401254     Document Type: Article
Times cited : (50)

References (31)
  • 2
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993), "Information systems security design methods: implications for information systems development", ACM Computing Surveys, Vol. 25 No. 4.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4
    • Baskerville, R.1
  • 4
    • 0003285928 scopus 로고
    • From subroutines to subsystems: Component-based software development
    • Clements, P. (1995), "From subroutines to subsystems: component-based software development", The American Programmer, Vol. 8 No. 11.
    • (1995) The American Programmer , vol.8 , Issue.11
    • Clements, P.1
  • 7
    • 0029533453 scopus 로고
    • There are some cracks in the cornerstone of information security
    • Duncan, R. (1995), "There are some cracks in the cornerstone of information security", Computers & Security, Vol. 14, pp. 675-80.
    • (1995) Computers & Security , vol.14 , pp. 675-680
    • Duncan, R.1
  • 8
    • 0002359154 scopus 로고    scopus 로고
    • Action research for the study of organisations
    • Clegg, S.R., Hardu, C. and Nord, W.R. (Eds), Sage, Beverly Hills, CA
    • Eden, C. and Huxham, C. (1996), "Action research for the study of organisations", in Clegg, S.R., Hardu, C. and Nord, W.R. (Eds), Handbook of Organisation Studies, Sage, Beverly Hills, CA.
    • (1996) Handbook of Organisation Studies
    • Eden, C.1    Huxham, C.2
  • 9
    • 0011420621 scopus 로고    scopus 로고
    • Information security: Process evaluation and product evaluation
    • Qing, S. and Eloff, J. (Eds), Kluwer Academic Publishers, New York, NY
    • Eloff, M., and Von Solms, B. (2000), "Information security: process evaluation and product evaluation", in Qing, S. and Eloff, J. (Eds), Information Security for Global Information Infrastructures, Kluwer Academic Publishers, New York, NY, pp. 11-19.
    • (2000) Information Security for Global Information Infrastructures , pp. 11-19
    • Eloff, M.1    Von Solms, B.2
  • 10
    • 0034321380 scopus 로고    scopus 로고
    • Integration of functional, cognitive and quality requirements. A railways case study
    • Felici, M. et al. (2000), "Integration of functional, cognitive and quality requirements. A railways case study", Information and Software Technology, Vol. 42, pp. 993-1000.
    • (2000) Information and Software Technology , vol.42 , pp. 993-1000
    • Felici, M.1
  • 11
    • 0011515608 scopus 로고
    • Is lack of serious acceptance and application of software quality assurance principles a password to information security problems?
    • Fillery, P. and Chantler, A. (1994), "Is lack of serious acceptance and application of software quality assurance principles a password to information security problems?", Proceedings of the IFIP/SEC94.
    • (1994) Proceedings of the IFIP/SEC94
    • Fillery, P.1    Chantler, A.2
  • 12
    • 0000722720 scopus 로고    scopus 로고
    • An empirical investigation into the adoption of system development methodologies
    • Fitzgerald, B. (1998), "An empirical investigation into the adoption of system development methodologies", Information & Management, Vol. 34, pp. 317-28.
    • (1998) Information & Management , vol.34 , pp. 317-328
    • Fitzgerald, B.1
  • 13
    • 0011467854 scopus 로고    scopus 로고
    • An examination of the role of the information systems center
    • Fowler, A. and Wilkinson, T. (1998), "An examination of the role of the information systems center", Journal of Strategic Information Systems, Vol. 7, pp. 87-111.
    • (1998) Journal of Strategic Information Systems , vol.7 , pp. 87-111
    • Fowler, A.1    Wilkinson, T.2
  • 15
    • 0032624280 scopus 로고    scopus 로고
    • Security views
    • Hancock, B. (1999), "Security views", Computers & Security, Vol. 18, pp. 646-59.
    • (1999) Computers & Security , vol.18 , pp. 646-659
    • Hancock, B.1
  • 16
    • 0011418384 scopus 로고
    • Integrating data security into the systems development life cycle
    • Hayam, A. and Oz, E. (1993), "Integrating data security into the systems development life cycle", Journal of Systems Management, Vol. 8 No 44, pp. 16-20.
    • (1993) Journal of Systems Management , vol.8 , Issue.44 , pp. 16-20
    • Hayam, A.1    Oz, E.2
  • 17
    • 0000179686 scopus 로고    scopus 로고
    • Personal information privacy: Implications for MIS managers
    • Henderson, S. and Snyder, C. (1999), "Personal information privacy: implications for MIS managers", Information & Management, Vol. 36, pp. 213-20.
    • (1999) Information & Management , vol.36 , pp. 213-220
    • Henderson, S.1    Snyder, C.2
  • 18
    • 0011432676 scopus 로고
    • Deficiencies of the traditional approach to information security and the requirements for a new methodology
    • Hitchings, J. (1995), "Deficiencies of the traditional approach to information security and the requirements for a new methodology", Computers & Security, Vol. 14, pp. 377-83.
    • (1995) Computers & Security , vol.14 , pp. 377-383
    • Hitchings, J.1
  • 19
    • 0041033430 scopus 로고    scopus 로고
    • The efficacy of matching information systems development methodologies with application characteristics - An empirical study
    • Howard, G.S. et al. (1999), "The efficacy of matching information systems development methodologies with application characteristics - an empirical study", The Journal of Systems and Software, Vol. 45, pp. 177-95.
    • (1999) The Journal of Systems and Software , vol.45 , pp. 177-195
    • Howard, G.S.1
  • 20
    • 0011517012 scopus 로고
    • INFOSEC Business Advisory Group, Version 2.0
    • IBAG (1993), Framework for Commercial IT Security, INFOSEC Business Advisory Group, Version 2.0.
    • (1993) Framework for Commercial IT Security
  • 23
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • Klein, H. and Myers, M. (1999), "A set of principles for conducting and evaluating interpretive field studies in information systems", MIS Quarterly, Vol. 23 No. 1, pp. 67-94.
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 67-94
    • Klein, H.1    Myers, M.2
  • 28
    • 84974872728 scopus 로고
    • Interpretive case studies in IS research: Nature and method
    • Walsham, G. (1995), "Interpretive case studies in IS research: nature and method", European Journal of Information Systems, Vol. 4, pp. 74-81.
    • (1995) European Journal of Information Systems , vol.4 , pp. 74-81
    • Walsham, G.1
  • 30
    • 0011476534 scopus 로고
    • Shifting IS security responsibility from user organisations to vendor/publisher organisations
    • Wood, C.C. (1995), "Shifting IS security responsibility from user organisations to vendor/publisher organisations", Computers & Security, Vol. 14, pp. 283-4.
    • (1995) Computers & Security , vol.14 , pp. 283-284
    • Wood, C.C.1
  • 31
    • 0011430405 scopus 로고
    • ISO 9000 and information security
    • Wood, C.C. and Snow, K. (1995), "ISO 9000 and information security", Computers & Security, Vol. 14, pp. 287-8.
    • (1995) Computers & Security , vol.14 , pp. 287-288
    • Wood, C.C.1    Snow, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.