메뉴 건너뛰기




Volumn 14, Issue 3, 2005, Pages 303-315

An analysis of the traditional IS security approaches: Implications for research and practice

Author keywords

Information security management; Secure systems design

Indexed keywords


EID: 30744438863     PISSN: 0960085X     EISSN: 14769344     Source Type: Journal    
DOI: 10.1057/palgrave.ejis.3000537     Document Type: Article
Times cited : (111)

References (60)
  • 2
    • 0028532579 scopus 로고
    • Why cryptosystems fall
    • ANDERSON R (1993) Why cryptosystems fall. Communication of the ACM 37(11), 32-44.
    • (1993) Communication of the ACM , vol.37 , Issue.11 , pp. 32-44
    • Anderson, R.1
  • 3
    • 30744434347 scopus 로고    scopus 로고
    • An analysis of the growth of computer and Internet security breaches
    • BAGCHI K and UDO G (2003) An analysis of the growth of computer and Internet security breaches. Communications of AIS 12, 684-700.
    • (2003) Communications of AIS , vol.12 , pp. 684-700
    • Bagchi, K.1    Udo, G.2
  • 4
    • 85008030889 scopus 로고    scopus 로고
    • Computer security research: A British perspective
    • BARNES BH (1998) Computer security research: a British perspective. IEEE Software 15(5), 30-33.
    • (1998) IEEE Software , vol.15 , Issue.5 , pp. 30-33
    • Barnes, B.H.1
  • 6
    • 0013324190 scopus 로고
    • Risk analysis: An interpretative feasibility tool in justifying information systems security
    • BASKERVILLE R (1991) Risk analysis: an interpretative feasibility tool in justifying information systems security. European Journal of Information Systems 1(2), 121-130.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 7
    • 0002082632 scopus 로고
    • The developmental duality of information systems security
    • BASKERVILLE R (1992) The developmental duality of information systems security, Journal of Management Systems 4(1), 1-12.
    • (1992) Journal of Management Systems , vol.4 , Issue.1 , pp. 1-12
    • Baskerville, R.1
  • 8
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • BASKERVILLE R (1993) Information systems security design methods: implications for information systems development. Computing Surveys 25(4), 375-414.
    • (1993) Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 9
    • 30744465298 scopus 로고
    • Code of practice for information security management
    • BS7799 British Standard Institution, London, UK
    • BS7799 (1993) Code of practice for information security management, Department of Trade and Industry, DISC PD003. British Standard Institution, London, UK.
    • (1993) Department of Trade and Industry, DISC PD003
  • 12
    • 0000130004 scopus 로고
    • Radical developments in accounting thought
    • CHUA WF (1986) Radical Developments in Accounting Thought. Accounting Review 61(5), 583-598.
    • (1986) Accounting Review , vol.61 , Issue.5 , pp. 583-598
    • Chua, W.F.1
  • 13
    • 0003889222 scopus 로고
    • NY: Penguin Books, New York, NY
    • CROSBY P (1979) Quality Is Free, NY: Penguin Books, New York, NY.
    • (1979) Quality Is Free
    • Crosby, P.1
  • 14
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Toward socio-organizational perspectives
    • DHILLON G and BACKHOUSE J (2001) Current directions in IS security research: toward socio-organizational perspectives. Information Systems Journal 11 (2), 129-156.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 129-156
    • Dhillon, G.1    Backhouse, J.2
  • 15
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: A hierarchical framework for various approaches
    • ELOFF MM and VON SOLMS SH (2000a) Information security management: a hierarchical framework for various approaches. Computers and Security 19, 243-256.
    • (2000) Computers and Security , vol.19 , pp. 243-256
    • Eloff, M.M.1    Von Solms, S.H.2
  • 20
    • 30744467132 scopus 로고    scopus 로고
    • Generally Accepted System Security Principles (CASSP). Version 2.0
    • June
    • GASSP (1999) Generally Accepted System Security Principles (CASSP). Version 2.0. Information Systems Security. June, vol. 8, no. 3.
    • (1999) Information Systems Security , vol.8 , Issue.3
  • 21
    • 30744472925 scopus 로고
    • Principles and procedures of the LRAM approach to information systems risk analysis and management
    • GUARRO SB (1987) Principles and procedures of the LRAM approach to information systems risk analysis and management. Computer and Security 6(6), 493-504.
    • (1987) Computer and Security , vol.6 , Issue.6 , pp. 493-504
    • Guarro, S.B.1
  • 28
    • 84897583836 scopus 로고    scopus 로고
    • Exploring the intellectual structures of information systems development: A social action theoretic analysis
    • HIRSCHHEIM R, KLEIN H K and LYYTINEN K (1996) Exploring the intellectual structures of information systems development: a social action theoretic analysis. Accounting, Management and Information Technologies 6, 1-64.
    • (1996) Accounting, Management and Information Technologies , vol.6 , pp. 1-64
    • Hirschheim, R.1    Klein, H.K.2    Lyytinen, K.3
  • 30
    • 0001214077 scopus 로고
    • A paradigmatic analysis of contemporary schools of IS development
    • IIVARI J (1991) A paradigmatic analysis of contemporary schools of IS development. European Journal of Information Systems 1(4), 249-272.
    • (1991) European Journal of Information Systems , vol.1 , Issue.4 , pp. 249-272
    • Iivari, J.1
  • 31
    • 0030286609 scopus 로고    scopus 로고
    • Analyzing information systems development: A comparison and analysis of eight IS development approaches
    • IIVARI J and HIRSCHHEIM R (1996) Analyzing information systems development: A comparison and analysis of eight IS development approaches. Information Systems 21(7), 551-575.
    • (1996) Information Systems , vol.21 , Issue.7 , pp. 551-575
    • Iivari, J.1    Hirschheim, R.2
  • 32
    • 0002165187 scopus 로고
    • A Sociocybernetic framework for the feature analysis of information systems design methodologies
    • OLLE TW, SOL HG, TULLY CJ, Eds, North-Holland: Amsterdam
    • IIVARI J and KEROLA P (1983) A Sociocybernetic framework for the feature analysis of information systems design methodologies. In Information Systems Design Methodologies: A Feature Analysis (OLLE TW, SOL HG, TULLY CJ, Eds), pp 87-139, North-Holland: Amsterdam.
    • (1983) Information Systems Design Methodologies: A Feature Analysis , pp. 87-139
    • Iivari, J.1    Kerola, P.2
  • 33
    • 0032334755 scopus 로고    scopus 로고
    • A paradigmatic analysis contrasting information systems development approaches and methodologies
    • IIVARI J, HIRSCHHEIM R and KLEIN HK (1998) A paradigmatic analysis contrasting information systems development approaches and methodologies. Information Systems Research 9, 164-193.
    • (1998) Information Systems Research , vol.9 , pp. 164-193
    • Iivari, J.1    Hirschheim, R.2    Klein, H.K.3
  • 34
    • 0034434529 scopus 로고    scopus 로고
    • A dynamic framework for classifying information systems development methodologies and approaches
    • IIVARI J, HIRSCHHEIM R and KLEIN H K (2001) A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches. Journal of Management Information Systems 17(3), 179-218.
    • (2001) Journal of Management Information Systems , vol.17 , Issue.3 , pp. 179-218
    • Iivari, J.1    Hirschheim, R.2    Klein, H.K.3
  • 35
    • 0011656102 scopus 로고    scopus 로고
    • Managing security functions using security standards
    • JANCZEWSKI L, Eds, Idea Group Publishing; USA
    • JANCZEWSKI L (2000) Managing Security Functions Using Security Standards. In Internet and Intranet Security Management: Risks and Solutions (JANCZEWSKI L, Eds), pp 81-105, Idea Group Publishing; USA.
    • (2000) Internet and Intranet Security Management: Risks and Solutions , pp. 81-105
    • Janczewski, L.1
  • 36
    • 0011648740 scopus 로고    scopus 로고
    • The new classification of research approaches
    • (ZEMANEK H, Ed), IFIP: Laxenburg, Austria
    • JÄRVINEN P (1997) The new classification of research approaches. In The IFIP Pink Summary - 36 years of IFIP (ZEMANEK H, Ed), pp 124-131, IFIP: Laxenburg, Austria.
    • (1997) The IFIP Pink Summary - 36 Years of IFIP , pp. 124-131
    • Järvinen, P.1
  • 38
    • 0040871337 scopus 로고
    • The poverty of scientism in information systems
    • (MUMFORD E et al. Eds), Elsevier Science Publisher: Amsterdam
    • KLEIN H and LYYTINEN K (1985) The poverty of scientism in information systems, In; Research methods in information systems (MUMFORD E et al. Eds), pp 131-161, Elsevier Science Publisher: Amsterdam.
    • (1985) Research Methods in Information Systems , pp. 131-161
    • Klein, H.1    Lyytinen, K.2
  • 39
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • KLEIN HK and MYERS MD (1999) A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly 23(1), 67-94.
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 67-94
    • Klein, H.K.1    Myers, M.D.2
  • 42
    • 0030386217 scopus 로고    scopus 로고
    • Electronic communications risk management: A checklist for business managers
    • MOULTON RT and MOULTON ME (1996) Electronic communications risk management: a checklist for business managers. Computer and Security 15(5), 377-386.
    • (1996) Computer and Security , vol.15 , Issue.5 , pp. 377-386
    • Moulton, R.T.1    Moulton, M.E.2
  • 43
    • 0021535278 scopus 로고
    • Measuring computer system security using software security metrics
    • In Computer Security: A global challenge (JH and Dougall EG, Eds), Finch Elsevier Science Publisher, Toronto, Ontario, Canada
    • MURINE GE and CARPENTER CL (1984) Measuring computer system security using software security metrics. In Computer Security: A global challenge (JH and Dougall EG, Eds), Finch Elsevier Science Publisher, Proceedings of the second IFIP International Conference on Computer Security (IFIP/Sec'84), Toronto, Ontario, Canada.
    • (1984) Proceedings of the Second IFIP International Conference on Computer Security (IFIP/Sec'84)
    • Murine, G.E.1    Carpenter, C.L.2
  • 44
    • 0040964323 scopus 로고
    • Data processing - Risk assessment
    • (WOFSEY MM, Ed), John Wiley and Sons Ltd: New York
    • SALTMARSH TJ and BROWNE PS (1983) Data processing - risk assessment. In: Advances In Computer Security Management (WOFSEY MM, Ed), Vol 2, pp 93-116, John Wiley and Sons Ltd: New York.
    • (1983) Advances in Computer Security Management , vol.2 , pp. 93-116
    • Saltmarsh, T.J.1    Browne, P.S.2
  • 46
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
    • in press
    • SIPONEN M (2005) Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods. Information and organization in press.
    • (2005) Information and Organization
    • Siponen, M.1
  • 47
    • 0011524195 scopus 로고    scopus 로고
    • SSE-CMM (1998a) The Model. v2.0. http://www.sse-cmm,org.
    • (1998) The Model. V2.0
  • 52
    • 0011587363 scopus 로고    scopus 로고
    • Information security program maturity grid
    • STACEY TR (1996) Information security program maturity grid. Information Systems Security 5(2), 22-33.
    • (1996) Information Systems Security , vol.5 , Issue.2 , pp. 22-33
    • Stacey, T.R.1
  • 53
    • 0030377647 scopus 로고    scopus 로고
    • Information security management: The second generation
    • VON SOLMS R (1996) Information security management: the second generation. Computers and Security 15(4), 281-288.
    • (1996) Computers and Security , vol.15 , Issue.4 , pp. 281-288
    • Von Solms, R.1
  • 55
    • 0011586156 scopus 로고    scopus 로고
    • Information security management (3): The code of practice for information security management (BS 7799)
    • VON SOLMS R (1998) Information security management (3): the code of practice for information security management (BS 7799). Information Management & Computer Security 6(5), 224-225.
    • (1998) Information Management & Computer Security , vol.6 , Issue.5 , pp. 224-225
    • Von Solms, R.1
  • 56
    • 0001897127 scopus 로고    scopus 로고
    • Information security management: Why standards are important
    • VON SOLMS R (1999) Information security management: why standards are important. Information Management and Computer Security 7(1), 50-58.
    • (1999) Information Management and Computer Security , vol.7 , Issue.1 , pp. 50-58
    • Von Solms, R.1
  • 58
    • 73549100231 scopus 로고    scopus 로고
    • The emergence of interpretivism in IS research
    • WALSHAM G (1996) The emergence of interpretivism in IS research. Information Systems Research 6(4), 376-394.
    • (1996) Information Systems Research , vol.6 , Issue.4 , pp. 376-394
    • Walsham, G.1
  • 59
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the past to prepare for future: Writing a literature review
    • WEBSTER J and WATSON RT (2002) Analyzing the past to prepare for future: writing a literature review. MIS Quarterly 6(2), xiii-xxii.
    • (2002) MIS Quarterly , vol.6 , Issue.2
    • Webster, J.1    Watson, R.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.