메뉴 건너뛰기




Volumn 8, Issue 2-3, 2000, Pages 107-116

The use of business process modelling in information systems security analysis and design

Author keywords

Business process analysis; Computer security; Information systems; Modelling; Risk

Indexed keywords

INDUSTRY; INFORMATION MANAGEMENT; INFORMATION TECHNOLOGY; RISK ASSESSMENT; SOCIETIES AND INSTITUTIONS;

EID: 0242329011     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220010339192     Document Type: Review
Times cited : (46)

References (30)
  • 1
    • 1842709028 scopus 로고
    • Business reengineering with business rules
    • Grover, V. and Kettinger, W. (Eds), IDEA Group Publishing, London
    • Appleton, D. (1995), "Business reengineering with business rules", in Grover, V. and Kettinger, W. (Eds), Business Process Change: Concepts, Methods and Technologies, IDEA Group Publishing, London, pp. 291-329.
    • (1995) Business Process Change: Concepts, Methods and Technologies , pp. 291-329
    • Appleton, D.1
  • 2
    • 0043000704 scopus 로고
    • Modelling offices through discourse analysis: The SAMPO approach
    • Auramaki, E., Hirschheim, R. and Lyytinen, K. (1992), "Modelling offices through discourse analysis: the SAMPO approach", The Computer Journal. Vol. 35 No. 4, pp. 342-52.
    • (1992) The Computer Journal , vol.35 , Issue.4 , pp. 342-352
    • Auramaki, E.1    Hirschheim, R.2    Lyytinen, K.3
  • 3
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibility and security of information systems
    • Backhouse, J. and Dhillon, G. (1996), "Structures of responsibility and security of information systems", European Journal of Information Systems, Vol. 5 No. 1, pp. 2-9.
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-9
    • Backhouse, J.1    Dhillon, G.2
  • 4
    • 0024717026 scopus 로고
    • Framework of a methodology for the life cycle of computer security in an organization
    • Badenhorst, K.P. and Eloff, J.H.P. (1989), "Framework of a methodology for the life cycle of computer security in an organization", Computers & Security, Vol. 8, pp. 433-42.
    • (1989) Computers & Security , vol.8 , pp. 433-442
    • Badenhorst, K.P.1    Eloff, J.H.P.2
  • 6
    • 0013324190 scopus 로고
    • Risk analysis: An interpretive feasibility tool in justifying information systems security
    • Baskerville, R. (1991), "Risk analysis: an interpretive feasibility tool in justifying information systems security", European Journal of Information Systems, Vol. 1 No. 2, pp. 121-30.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 9
    • 84976766949 scopus 로고
    • The entity-relationship model: Towards a unified view of data
    • Chen, P.P. (1976), "The entity-relationship model: towards a unified view of data", ACM Transactions on Database Systems, Vol. 1 No. 1, pp. 9-35.
    • (1976) ACM Transactions on Database Systems , vol.1 , Issue.1 , pp. 9-35
    • Chen, P.P.1
  • 11
    • 1842709019 scopus 로고
    • A methodology for analysing human and computer-related issues in secure systems
    • Dittrich, K., Rautakivi, S. and Saari, J. (Eds), Elsevier Science Publ., North-Holland
    • Dobson, J. (1991), "A methodology for analysing human and computer-related issues in secure systems", in Dittrich, K., Rautakivi, S. and Saari, J. (Eds), Computer Security and Information Integrity, Elsevier Science Publ., North-Holland.
    • (1991) Computer Security and Information Integrity
    • Dobson, J.1
  • 13
    • 0007423744 scopus 로고
    • European Commission, DGXIII, contract S2001, Brussels, Luxembourg
    • European Commission (1993a), Glossary of Information Systems Security, European Commission, DGXIII, contract S2001, Brussels, Luxembourg.
    • (1993) Glossary of Information Systems Security
  • 14
    • 0003799580 scopus 로고
    • European Commission, DGXIII, INFOSEC Project S2014/WP08, Brussels, Luxembourg
    • European Commission (1993b), Risk Analysis Methods Database, European Commission, DGXIII, INFOSEC Project S2014/WP08, Brussels, Luxembourg.
    • (1993) Risk Analysis Methods Database
  • 17
    • 0031628589 scopus 로고    scopus 로고
    • Recent security surveys
    • Hinde, S. (1998), "Recent security surveys", Computers & Security, Vol. 17, pp. 207-10.
    • (1998) Computers & Security , vol.17 , pp. 207-210
    • Hinde, S.1
  • 18
    • 8644292339 scopus 로고
    • Achieving an integrated design: The way forward for information security
    • Ellof, J. and von Solms, S. (Eds), IFIP SEC'95, Chapman & Hall, London
    • Hitchings, J. (1995), "Achieving an integrated design: the way forward for information security", in Ellof, J. and von Solms, S. (Eds), Information Security - the Next Decade, IFIP SEC'95, Chapman & Hall, London.
    • (1995) Information Security - The next Decade
    • Hitchings, J.1
  • 20
    • 0004637330 scopus 로고
    • Process modelling - Who, what and how - role activity diagramming
    • Grover, V. and Kettinger, W. (Eds), IDEA Group Publishing, London
    • Huckvale, T. and Ould, M. (1995), "Process modelling - who, what and how - role activity diagramming", in Grover, V. and Kettinger, W. (Eds), Business Process Change: Concepts, Methods and Technologies. IDEA Group Publishing, London, pp. 330-49.
    • (1995) Business Process Change: Concepts, Methods and Technologies , pp. 330-349
    • Huckvale, T.1    Ould, M.2
  • 22
    • 0001841217 scopus 로고    scopus 로고
    • Business process change: A study of methodologies, techniques, and tools
    • Kettinger, W.J., Teng, J.T.C. and Guha, S. (1997), "Business process change: a study of methodologies, techniques, and tools", MIS Quarterly, Vol. 21 No. 1.
    • (1997) MIS Quarterly , vol.21 , Issue.1
    • Kettinger, W.J.1    Teng, J.T.C.2    Guha, S.3
  • 23
    • 0030384205 scopus 로고    scopus 로고
    • The role of information security in corporate governance
    • Lindup, K. (1996), "The role of information security in corporate governance", Computers & Security, Vol. 15, pp. 477-85.
    • (1996) Computers & Security , vol.15 , pp. 477-485
    • Lindup, K.1
  • 24
    • 1642620069 scopus 로고
    • Enterprise modelling and security policies
    • Jajodia, S. and Landwehr, C.E. (Eds), Elsevier Science Publ., North-Holland
    • Martin, M. and Dobson, J. (1991), "Enterprise modelling and security policies", in Jajodia, S. and Landwehr, C.E. (Eds), Database Security IV: Status and Prospects, Elsevier Science Publ., North-Holland.
    • (1991) Database Security IV: Status and Prospects
    • Martin, M.1    Dobson, J.2
  • 25
    • 0004637331 scopus 로고
    • A framework and a suite of methods for business process reengineering
    • Grover, V. and Kettinger, W. (Eds). IDEA Group Publishing, London
    • Mayer, R., Benjamin, P., Caraway, B. and Painter, M. (1995), "A framework and a suite of methods for business process reengineering", in Grover, V. and Kettinger, W. (Eds). Business Process Change: Concepts. Methods and Technologies, IDEA Group Publishing, London, pp. 245-90.
    • (1995) Business Process Change: Concepts. Methods and Technologies , pp. 245-290
    • Mayer, R.1    Benjamin, P.2    Caraway, B.3    Painter, M.4
  • 27
    • 0027874793 scopus 로고
    • A new approach to business processes
    • Scherr, A.L. (1993), "A new approach to business processes", IBM Systems Journal, Vol. 32 No. 1, pp. 80-98.
    • (1993) IBM Systems Journal , vol.32 , Issue.1 , pp. 80-98
    • Scherr, A.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.