메뉴 건너뛰기




Volumn 11, Issue 5, 2003, Pages 243-248

An integrated system theory of information security management

Author keywords

Contingency planning; Control systems; Information systems; Risk management; Systems theory

Indexed keywords

CONTROL SYSTEMS; CONTROL THEORY; ELECTRONIC COMMERCE; INFORMATION MANAGEMENT; RISK MANAGEMENT; SYSTEM THEORY;

EID: 0345327795     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220310500153     Document Type: Article
Times cited : (113)

References (22)
  • 2
    • 0345302810 scopus 로고    scopus 로고
    • COBIT; ISACA, Rolling Meadows, IL
    • COBIT (1998), COBIT: Control Objectives, ISACA, Rolling Meadows, IL.
    • (1998) COBIT: Control Objectives
  • 3
    • 84935322454 scopus 로고
    • Alternative forms of fit in contingency theory
    • Drazin, R. and Van de Ven, A.H. (1985), "Alternative forms of fit in contingency theory", Administrative Science Quarterly, Vol. 30 No. 4, pp. 514-39.
    • (1985) Administrative Science Quarterly , vol.30 , Issue.4 , pp. 514-539
    • Drazin, R.1    Van De Ven, A.H.2
  • 4
    • 0034516080 scopus 로고    scopus 로고
    • Information security management: An approach to combine process certification and product evaluation
    • Eloff, M.M. and Solms, S.H.V. (2000), "Information security management: an approach to combine process certification and product evaluation", Computers & Security, Vol. 19 No. 3, pp. 698-709.
    • (2000) Computers & Security , vol.19 , Issue.3 , pp. 698-709
    • Eloff, M.M.1    Solms, S.H.V.2
  • 6
    • 0004256091 scopus 로고    scopus 로고
    • John Wiley & Sons, New York, NY
    • Gollmann, D. (1999), Computer Security, John Wiley & Sons, New York, NY.
    • (1999) Computer Security
    • Gollmann, D.1
  • 7
    • 35048850098 scopus 로고    scopus 로고
    • The experimental analysis of information security management issues for online financial services
    • Gupta, M., Charturvedi, A.R., Metha, S. and Valeri, L. (2001), "The experimental analysis of information security management issues for online financial services", ICIS 2000, pp. 667-75.
    • (2001) ICIS 2000 , pp. 667-675
    • Gupta, M.1    Charturvedi, A.R.2    Metha, S.3    Valeri, L.4
  • 11
    • 0020185645 scopus 로고
    • A management science approach to contingency models of organizational structure
    • Lee, S.M., Luthans, F. and Olson, D.L. (1982), "A management science approach to contingency models of organizational structure", Academy of Management Journal, Vol. 25 No. 3, pp. 553-66.
    • (1982) Academy of Management Journal , vol.25 , Issue.3 , pp. 553-566
    • Lee, S.M.1    Luthans, F.2    Olson, D.L.3
  • 13
    • 0034955243 scopus 로고    scopus 로고
    • Extending the risk analysis model to include market insurance
    • Reid, R.C. and Floyd, S.A. (2001), "Extending the risk analysis model to include market insurance", Computers & Security, Vol. 20 No. 4, pp. 331-9.
    • (2001) Computers & Security , vol.20 , Issue.4 , pp. 331-339
    • Reid, R.C.1    Floyd, S.A.2
  • 14
    • 0004171318 scopus 로고
    • Prentice-Hall, Upper Saddle River, NJ
    • Robbins, S.P. (1994), Management, 4th ed., Prentice-Hall, Upper Saddle River, NJ.
    • (1994) Management, 4th Ed.
    • Robbins, S.P.1
  • 15
    • 0035149763 scopus 로고    scopus 로고
    • Usability and security: An appraisal of usability issues in information security methods
    • Schultz, E.E., Proctor, R.W. and Lien, M.C. (2001), "Usability and security: an appraisal of usability issues in information security methods", Computers & Security, Vol. 20 No. 18, pp. 620-34.
    • (2001) Computers & Security , vol.20 , Issue.18 , pp. 620-634
    • Schultz, E.E.1    Proctor, R.W.2    Lien, M.C.3
  • 16
    • 0344439808 scopus 로고    scopus 로고
    • SALSA: A method for developing the enterprise security architecture and strategy
    • Sherwood, J. (1996), "SALSA: a method for developing the enterprise security architecture and strategy", Computers & Security, Vol. 2, pp. 8-17.
    • (1996) Computers & Security , vol.2 , pp. 8-17
    • Sherwood, J.1
  • 18
    • 0003538232 scopus 로고
    • Computer security - Threats, vulnerabilities and countermeasures
    • Smith, M. (1989), "Computer security - threats, vulnerabilities and countermeasures", Information Age, Vol. 11 No. 4, pp. 205-10.
    • (1989) Information Age , vol.11 , Issue.4 , pp. 205-210
    • Smith, M.1
  • 22
    • 0141883323 scopus 로고    scopus 로고
    • Third generation risk management practices
    • Wright, M. (1999), "Third generation risk management practices", Computers & Security, Vol. 1999 No. 2, pp. 9-12.
    • (1999) Computers & Security , vol.1999 , Issue.2 , pp. 9-12
    • Wright, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.