메뉴 건너뛰기




Volumn 6, Issue 2-3, 2005, Pages 203-225

A management perspective on risk of security threats to information systems

Author keywords

Business; Cost; Information system; Management; Security; Threat

Indexed keywords


EID: 19544371722     PISSN: 1385951X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10799-005-5880-5     Document Type: Article
Times cited : (64)

References (36)
  • 1
    • 19544370133 scopus 로고    scopus 로고
    • British Security Standard BS 7799 (British Standards)
    • British Security Standard, BS 7799 (British Standards, 1999).
    • (1999)
  • 2
    • 0033718563 scopus 로고    scopus 로고
    • Building trust in electronic commerce
    • V. Ahuja, Building trust in electronic commerce, IT Professional 2(3) (2000) 61-63
    • (2000) IT Professional , vol.2 , Issue.3 , pp. 61-63
    • Ahuja, V.1
  • 3
    • 0023327666 scopus 로고
    • Cost-effectiveness modeling for a decision support system in computer security
    • T. Bui and T.R. Sivasankaran, Cost-effectiveness modeling for a decision support system in computer security, Computers and Security 6 (1987) 139-151.
    • (1987) Computers and Security , vol.6 , pp. 139-151
    • Bui, T.1    Sivasankaran, T.R.2
  • 5
    • 19544391758 scopus 로고    scopus 로고
    • Cohen (1997) http://citeseer.nj.nec.com/lee00toward.html
    • (1997)
    • Cohen1
  • 7
    • 0011119081 scopus 로고    scopus 로고
    • Active security a proactive approach for computer security systems
    • G. Eschellbeck, Active Security A Proactive Approach for Computer Security Systems, Journal of Network and Computer Applications 23(2000) 109-130.
    • (2000) Journal of Network and Computer Applications , vol.23 , pp. 109-130
    • Eschellbeck, G.1
  • 12
    • 19544384091 scopus 로고    scopus 로고
    • Issues in the Law of Electronic Commerce
    • R.L. Field, Issues in the Law of Electronic Commerce, Networker (ACM Press) 1(3) (1997) 28-37.
    • (1997) Networker (ACM Press) , vol.1 , Issue.3 , pp. 28-37
    • Field, R.L.1
  • 13
    • 0002544658 scopus 로고    scopus 로고
    • Software security and privacy risks in mobile e-commerce
    • A.K. Ghosh and T.M. Swaminatha, Software security and privacy risks in mobile e-commerce, Communications of the ACM 44(2) (2001) 51-57.
    • (2001) Communications of the ACM , vol.44 , Issue.2 , pp. 51-57
    • Ghosh, A.K.1    Swaminatha, T.M.2
  • 14
  • 15
    • 0003767375 scopus 로고
    • Information Processing Systems-Open Systems Interconnection-Basic Reference Model, Part 2: Security Architecture
    • ISO ISO 7498-2
    • ISO, Information Processing Systems-Open Systems Interconnection-Basic Reference Model, Part 2: Security Architecture, ISO 7498-2 (1989).
    • (1989)
  • 16
    • 0000206310 scopus 로고    scopus 로고
    • Security models for web-Based applications
    • J. Joshi et al., Security Models for Web-Based Applications, Communications of the ACM 44(2) (2001) 38-44.
    • (2001) Communications of the ACM , vol.44 , Issue.2 , pp. 38-44
    • Joshi, J.1
  • 17
    • 12844284330 scopus 로고
    • A taxonomy of computer program security flaws, with examples
    • Naval Research Laboratory (Nov.)
    • C.E. Landwehr et al., A Taxonomy of Computer Program Security Flaws, with Examples, Naval Research Laboratory (Nov. 1993).
    • (1993)
    • Landwehr, C.E.1
  • 18
    • 0031378491 scopus 로고    scopus 로고
    • Security Issues in Networks with Internet Access
    • 10.1109/5.650183
    • C.E. Landwehr and D.M. Goldschlag, Security Issues in Networks with Internet Access, in: Proceedings of the IEEE 85(12) (1997) 2034 2034-2051 10.1109/5.650183
    • (1997) Proceedings of the IEEE , vol.85 , Issue.12 , pp. 2034-2051
    • Landwehr, C.E.1    Goldschlag, D.M.2
  • 19
    • 0032298328 scopus 로고    scopus 로고
    • Internet risks for computers
    • S. Lichtenstein, Internet Risks for Computers, Computers & Security 17 (1998) 143-150.
    • (1998) Computers & Security , vol.17 , pp. 143-150
    • Lichtenstein, S.1
  • 22
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • 10.1016/S1389-1286(00)00139-0
    • R. Lipmann, et al., The 1999 DARPA off-line Intrusion Detection Evaluation, Computer Networks 34 (2000) 579-595. 10.1016/ S1389-1286(00)00139-0
    • (2000) Computer Networks , vol.34 , pp. 579-595
    • Lipmann, R.1
  • 23
    • 0033893895 scopus 로고    scopus 로고
    • E-commerce trust metrics and models
    • 10.1109/4236.832944
    • D.W. Manchala, E-commerce trust metrics and models, IEEE Internet Computing 4(2) (2000) 36-44. 10.1109/4236.832944
    • (2000) IEEE Internet Computing , vol.4 , Issue.2 , pp. 36-44
    • Manchala, D.W.1
  • 24
    • 0036737236 scopus 로고    scopus 로고
    • Developing and validating trust measures for e-Commerce: An integrative typology
    • 10.1287/isre.13.3.334.81
    • D.H. McKnight, C. Choudhury and C. Kacmar, Developing and Validating Trust Measures for e-Commerce: An Integrative Typology, Information Systems Research 13(3) (2002) 334-359. 10.1287/isre.13.3.334.81
    • (2002) Information Systems Research , vol.13 , Issue.3 , pp. 334-359
    • McKnight, D.H.1    Choudhury, C.2    Kacmar, C.3
  • 25
    • 0000565716 scopus 로고
    • A summary of computer misuse techniques
    • (Oct.) National Institute of Standards and Technology/National Computer Security Center
    • P.G. Neumann and D.B. Parker, A Summary of Computer Misuse Techniques, in: Proceedings of the 12th National Computer Security Conference (Oct. 1989) 396-407. National Institute of Standards and Technology/National Computer Security Center.
    • (1989) Proceedings of the 12th National Computer Security Conference , pp. 396-407
    • Neumann, P.G.1    Parker, D.B.2
  • 26
    • 0003508568 scopus 로고
    • National Bureau of Standards (NBS) (FIPS Publ. 46, Jan)
    • National Bureau of Standards (NBS), Data Encryption Standards (FIPS Publ. 46, Jan 1977).
    • (1977) Data Encryption Standards
  • 28
    • 0005001185 scopus 로고    scopus 로고
    • Probabilistic modeling of terrorist attacks: A system analysis approach to setting priorities among countermeasures
    • (Oct.)
    • E. Pate-Cornell and S. Guikema, Probabilistic Modeling of Terrorist Attacks: A System Analysis Approach to Setting Priorities Among Countermeasures, Military Operation Research (Oct. 2002).
    • (2002) Military Operation Research
    • Pate-Cornell, E.1    Guikema, S.2
  • 31
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-Key cryptosystems
    • R.L. Rivest, A. Shamir and L.M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, CACM 21(2) (1978) 120-126.
    • (1978) CACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.