메뉴 건너뛰기




Volumn 41, Issue 2, 2003, Pages 149-158

The IS risk analysis based on a business model

Author keywords

Analytic Hierarchy Process (AHP); Asset valuation; Asset function assignment; Business model; Paired comparison; Risk analysis

Indexed keywords

COSTS; DECISION MAKING; RISK ASSESSMENT; VALUE ENGINEERING;

EID: 0141919268     PISSN: 03787206     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0378-7206(03)00044-2     Document Type: Article
Times cited : (110)

References (30)
  • 1
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville R. Information systems security design methods: implications for information systems development. ACM Computing Surveys. 25(4):1993;375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 3
    • 0141952239 scopus 로고
    • CCTA UK Government Central Computer and Telecommunications Agency (CCTA), IT Security and Privacy Group, London, UK
    • CCTA, The CCTA Risk Analysis and Management Method (CRAMM) User Guide, UK Government Central Computer and Telecommunications Agency (CCTA), IT Security and Privacy Group, London, UK, 1993.
    • (1993) The CCTA Risk Analysis and Management Method (CRAMM) User Guide
  • 5
    • 0141986903 scopus 로고
    • Analyzing the cost-effectiveness of computer controls and security
    • Cerullo M.J., Shelton F.A. Analyzing the cost-effectiveness of computer controls and security. The Internal Auditor. 38(5):1981;30-37.
    • (1981) The Internal Auditor , vol.38 , Issue.5 , pp. 30-37
    • Cerullo, M.J.1    Shelton, F.A.2
  • 6
    • 0030658708 scopus 로고    scopus 로고
    • Risk analysis: Requirements, conflicts and problems
    • Ciechanowicz Z. Risk analysis: requirements, conflicts and problems. Computers & Security. 16(3):1997;223-232.
    • (1997) Computers & Security , vol.16 , Issue.3 , pp. 223-232
    • Ciechanowicz, Z.1
  • 7
    • 0031631068 scopus 로고    scopus 로고
    • A conceptual framework for information security management
    • Finne T. A conceptual framework for information security management. Computers & Security. 17(4):1998;303-307.
    • (1998) Computers & Security , vol.17 , Issue.4 , pp. 303-307
    • Finne, T.1
  • 8
    • 0034159453 scopus 로고    scopus 로고
    • Information systems risk management: Key concepts and business processes
    • Finne T. Information systems risk management: key concepts and business processes. Computers & Security. 19(3):2000;234-242.
    • (2000) Computers & Security , vol.19 , Issue.3 , pp. 234-242
    • Finne, T.1
  • 9
    • 0141917864 scopus 로고    scopus 로고
    • United States General Accounting Office (GAO), Accounting and Information Management Division, Washington, DC, USA
    • GAO, Executive Guide Information Security Management: Learning from Leading Organizations, United States General Accounting Office (GAO), Accounting and Information Management Division, Washington, DC, USA, 1998.
    • (1998) Executive Guide Information Security Management: Learning from Leading Organizations
  • 10
    • 0033114880 scopus 로고    scopus 로고
    • Physical protection systems - Cost and performance analysis: A case study
    • Hicks M.J., Snell M.S., Sandoval J.S., Potter C.S. Physical protection systems - cost and performance analysis: a case study. IEEE AES Systems Magazine. 14(4):1999;9-13.
    • (1999) IEEE AES Systems Magazine , vol.14 , Issue.4 , pp. 9-13
    • Hicks, M.J.1    Snell, M.S.2    Sandoval, J.S.3    Potter, C.S.4
  • 14
    • 0029508261 scopus 로고
    • RAMeX: A prototype expert system for computer security risk analysis and management
    • Kailay M.P., Jarratt P. RAMeX: a prototype expert system for computer security risk analysis and management. Computers & Security. 14(5):1995;449-463.
    • (1995) Computers & Security , vol.14 , Issue.5 , pp. 449-463
    • Kailay, M.P.1    Jarratt, P.2
  • 16
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch K.D., Carr H.H., Warkentin M.E. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly. 16(2):1992;173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 18
    • 0141952237 scopus 로고    scopus 로고
    • Developing an IS risk assessment process
    • McNamee D. Developing an IS risk assessment process. IS Audit & Control Journal. 1996(3):1996;14-18.
    • (1996) IS Audit & Control Journal , vol.1996 , Issue.3 , pp. 14-18
    • McNamee, D.1
  • 20
    • 0033646117 scopus 로고    scopus 로고
    • A practical risk analysis approach: Managing BCM risk
    • Nosworthy J.D. A practical risk analysis approach: managing BCM risk. Computers & Security. 19(7):2000;596-614.
    • (2000) Computers & Security , vol.19 , Issue.7 , pp. 596-614
    • Nosworthy, J.D.1
  • 21
    • 55249117122 scopus 로고
    • A stochastic dominance approach to risk analysis of computer systems
    • Post G.V., Diltz J.D. A stochastic dominance approach to risk analysis of computer systems. MIS Quarterly. 10(4):1986;363-375.
    • (1986) MIS Quarterly , vol.10 , Issue.4 , pp. 363-375
    • Post, G.V.1    Diltz, J.D.2
  • 23
    • 0025700933 scopus 로고
    • How to make a decision: The analytic hierarchy process
    • Saaty T.L. How to make a decision: the analytic hierarchy process. European Journal of Operational Research. 48(1):1990;9-26.
    • (1990) European Journal of Operational Research , vol.48 , Issue.1 , pp. 9-26
    • Saaty, T.L.1
  • 30
    • 0141883323 scopus 로고    scopus 로고
    • Third generation risk management practices
    • Wright M. Third generation risk management practices. Computer Fraud & Security. 1999(2):1999;9-12.
    • (1999) Computer Fraud & Security , vol.1999 , Issue.2 , pp. 9-12
    • Wright, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.