메뉴 건너뛰기




Volumn 106, Issue 2, 2006, Pages 242-255

Balancing performance measures for information security management: A balanced scorecard framework

Author keywords

Balanced scorecard; Data security; Manufacturing industries; Performance measures; Taiwan

Indexed keywords

INFORMATION MANAGEMENT; INVESTMENTS; MANUFACTURE; PROJECT MANAGEMENT; SOCIETIES AND INSTITUTIONS;

EID: 33644586763     PISSN: 02635577     EISSN: None     Source Type: Journal    
DOI: 10.1108/02635570610649880     Document Type: Article
Times cited : (43)

References (35)
  • 1
    • 1642303881 scopus 로고    scopus 로고
    • The myth of secure computing
    • Austin, R.D. and Darby, C. (2003), "The myth of secure computing", Harvard Business Review, Vol. 81 No. 6, pp. 120-6.
    • (2003) Harvard Business Review , vol.81 , Issue.6 , pp. 120-126
    • Austin, R.D.1    Darby, C.2
  • 2
    • 33644542600 scopus 로고    scopus 로고
    • A usability study of internet privacy policies for state and commercial websites
    • Becker, S.A. (2004), "A usability study of internet privacy policies for state and commercial websites", International Journal of Services and Standards, Vol. 1 No. 1, pp. 52-68.
    • (2004) International Journal of Services and Standards , vol.1 , Issue.1 , pp. 52-68
    • Becker, S.A.1
  • 5
    • 33644585480 scopus 로고    scopus 로고
    • Exploring prevention and perpetrator aspects concerning employee fraud in organisations
    • Bryan, L.D. and Smith, A.D. (2005), "Exploring prevention and perpetrator aspects concerning employee fraud in organisations", International Journal of Management and Enterprise Development, Vol. 2 Nos 3/4, pp. 257-87.
    • (2005) International Journal of Management and Enterprise Development , vol.2 , Issue.34 , pp. 257-287
    • Bryan, L.D.1    Smith, A.D.2
  • 6
    • 33644610628 scopus 로고    scopus 로고
    • paper presented at Workshop on Economics and Information Security University of California Berkeley, CA
    • Carini, B. and Morel, B. (2002), "Dynamics and equilibria of information security investment", paper presented at Workshop on Economics and Information Security, University of California, Berkeley, CA.
    • (2002) Dynamics and Equilibria of Information Security Investment
    • Carini, B.1    Morel, B.2
  • 7
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute Publications Washington, DC available at: http://i.cmpnet.com/gocsi/dbarea/pdfs/fbi/FBI2004.pdf
    • Computer Security Institute - CSI (2005), "2004 CSI/FBI Computer Crime and Security Survey", Computer Security Institute Publications, Washington, DC, available at: http://i.cmpnet.com/gocsi/dbarea/pdfs/fbi/FBI2004. pdf.
    • (2005) 2004 CSI/FBI Computer Crime and Security Survey
  • 8
    • 0034516080 scopus 로고    scopus 로고
    • Information security management: An approach to combine process certification and product evaluation
    • Eloff, M.M. and Von Solms, S.H. (2000), "Information security management: an approach to combine process certification and product evaluation", Computers & Security, Vol. 19 No. 8, pp. 698-709.
    • (2000) Computers & Security , vol.19 , Issue.8 , pp. 698-709
    • Eloff, M.M.1    Von Solms, S.H.2
  • 9
    • 33644591749 scopus 로고    scopus 로고
    • European Software Institute Zamudio available at: www.esi.es/en/ Technologies/iBITS.html
    • European Software Institute - ESI (2004), Balanced IT Scorecard (BITS), European Software Institute, Zamudio, available at: www.esi.es/en/Technologies/ iBITS.html.
    • (2004) Balanced IT Scorecard (BITS)
  • 10
    • 18844456006 scopus 로고    scopus 로고
    • Have you met your organization's computer usage policy?
    • Foltz, C.B., Cronan, T.P. and Jones, T.W. (2005), "Have you met your organization's computer usage policy?", Industrial Management & Data Systems, Vol. 105 No. 2, pp. 137-46.
    • (2005) Industrial Management & Data Systems , vol.105 , Issue.2 , pp. 137-146
    • Foltz, C.B.1    Cronan, T.P.2    Jones, T.W.3
  • 11
  • 12
    • 33644607902 scopus 로고    scopus 로고
    • Accounting and Information Management Division, United States General Accounting Office Washington, DC available at: www.gao.gov/special.pubs/ai00033. pdf
    • General Accounting Office - GAO (2004), Information Security Risk Assessment: Practices of Leading Organizations, Accounting and Information Management Division, United States General Accounting Office, Washington, DC, available at: www.gao.gov/special.pubs/ai00033.pdf.
    • (2004) Information Security Risk Assessment: Practices of Leading Organizations
  • 13
    • 0038223766 scopus 로고    scopus 로고
    • Using information security as a response to competitor analysis systems
    • Gordon, L.A. and Loeb, M.P. (2001), "Using information security as a response to competitor analysis systems", Communications of the ACM, Vol. 44 No. 9, pp. 70-5.
    • (2001) Communications of the ACM , vol.44 , Issue.9 , pp. 70-75
    • Gordon, L.A.1    Loeb, M.P.2
  • 15
    • 33644586451 scopus 로고    scopus 로고
    • Information Systems Audit and Control Association Chicago, IL available at: www.isaca.org
    • Information Systems Audit and Control Association - ISACA (2004), Control Objectives for Information and Related Technology (COBIT), Information Systems Audit and Control Association, Chicago, IL, available at: www.isaca.org.
    • (2004) Control Objectives for Information and Related Technology (COBIT)
  • 16
    • 2942625232 scopus 로고    scopus 로고
    • Coming up short on nonfinancial performance measurement
    • Ittner, C.D. and Larcker, D.F. (2003), "Coming up short on nonfinancial performance measurement", Harvard Business Review, Vol. 81 No. 11, pp. 88-95.
    • (2003) Harvard Business Review , vol.81 , Issue.11 , pp. 88-95
    • Ittner, C.D.1    Larcker, D.F.2
  • 17
    • 0041862581 scopus 로고    scopus 로고
    • Key obstacles to EDI success: From the US small manufacturing companies' perspective
    • Jun, M. and Cai, S. (2003), "Key obstacles to EDI success: from the US small manufacturing companies' perspective", Industrial Management & Data Systems, Vol. 103 No. 3, pp. 192-203.
    • (2003) Industrial Management & Data Systems , vol.103 , Issue.3 , pp. 192-203
    • Jun, M.1    Cai, S.2
  • 18
    • 54349116635 scopus 로고    scopus 로고
    • Transforming the balanced scorecard from performance measurement to strategic management: Part i
    • Kaplan, R.S. and Norton, D.P. (2001), "Transforming the balanced scorecard from performance measurement to strategic management: Part I", Accounting Horizons, Vol. 15 No. 1, pp. 87-104.
    • (2001) Accounting Horizons , vol.15 , Issue.1 , pp. 87-104
    • Kaplan, R.S.1    Norton, D.P.2
  • 22
    • 2342418367 scopus 로고    scopus 로고
    • Impact of computer disasters on information management: A study
    • Kundu, S.C. (2004), "Impact of computer disasters on information management: a study", Industrial Management & Data System, Vol. 104 No. 2, pp. 136-43.
    • (2004) Industrial Management & Data System , vol.104 , Issue.2 , pp. 136-143
    • Kundu, S.C.1
  • 23
    • 84986938722 scopus 로고
    • A quantitative approach to content validity
    • Lawshe, C.H. (1975), "A quantitative approach to content validity", Personnel Psychology, Vol. 28, pp. 564-75.
    • (1975) Personnel Psychology , vol.28 , pp. 564-575
    • Lawshe, C.H.1
  • 24
    • 2342427050 scopus 로고    scopus 로고
    • An integrated evaluation system based on the continuous improvement model of IS performance
    • Leem, C.S. and Kim, I. (2004), "An integrated evaluation system based on the continuous improvement model of IS performance", Industrial Management & Data Systems, Vol. 104 No. 2, pp. 115-28.
    • (2004) Industrial Management & Data Systems , vol.104 , Issue.2 , pp. 115-128
    • Leem, C.S.1    Kim, I.2
  • 25
    • 14544275961 scopus 로고    scopus 로고
    • Mobile commerce's impact on today's workforce: Issues, impacts and implications
    • McIntosh, J.C. and Baron, J.P. (2005), "Mobile commerce's impact on today's workforce: issues, impacts and implications", International Journal of Mobile Communications, Vol. 3 No. 2, pp. 99-113.
    • (2005) International Journal of Mobile Communications , vol.3 , Issue.2 , pp. 99-113
    • McIntosh, J.C.1    Baron, J.P.2
  • 26
    • 0033076569 scopus 로고    scopus 로고
    • The balanced scorecard: A foundation for the strategic management of information systems
    • Martinsons, M., Davison, R. and Tse, D. (1999), "The balanced scorecard: a foundation for the strategic management of information systems", Decision Support Systems, Vol. 25 No. 1, pp. 71-88.
    • (1999) Decision Support Systems , vol.25 , Issue.1 , pp. 71-88
    • Martinsons, M.1    Davison, R.2    Tse, D.3
  • 27
    • 0038519807 scopus 로고    scopus 로고
    • Dynamic corporate culture lies at the heart of effective security strategy
    • May, C. (2003), "Dynamic corporate culture lies at the heart of effective security strategy", Computer Fraud & Security, Vol. 5, pp. 10-13.
    • (2003) Computer Fraud & Security , vol.5 , pp. 10-13
    • May, C.1
  • 28
    • 0037363908 scopus 로고    scopus 로고
    • Business performance and dimensions of strategic orientation
    • Morgan, R.E. and Strong, C.A. (2003), "Business performance and dimensions of strategic orientation", Journal of Business Research, Vol. 56 No. 3, pp. 163-76.
    • (2003) Journal of Business Research , vol.56 , Issue.3 , pp. 163-176
    • Morgan, R.E.1    Strong, C.A.2
  • 30
    • 8444250312 scopus 로고    scopus 로고
    • Improving the ROI of the security management process
    • Purser, S.A. (2004), "Improving the ROI of the security management process", Computers & Security, Vol. 23, pp. 542-6.
    • (2004) Computers & Security , vol.23 , pp. 542-546
    • Purser, S.A.1
  • 31
    • 0003158414 scopus 로고    scopus 로고
    • Develop long-term competitiveness through IT assets
    • Ross, J.W., Beath, C.M. and Goodhue, D.L. (1996), "Develop long-term competitiveness through IT assets", MIT Sloan Management Review, Vol. 38 No. 1, pp. 31-42.
    • (1996) MIT Sloan Management Review , vol.38 , Issue.1 , pp. 31-42
    • Ross, J.W.1    Beath, C.M.2    Goodhue, D.L.3
  • 32
    • 3142782985 scopus 로고    scopus 로고
    • Issues in linking information technology capability to firm performance
    • Santhanam, R. and Hartono, E. (2003), "Issues in linking information technology capability to firm performance", MIS Quarterly, Vol. 27 No. 1, pp. 125-53.
    • (2003) MIS Quarterly , vol.27 , Issue.1 , pp. 125-153
    • Santhanam, R.1    Hartono, E.2
  • 33
    • 0038205942 scopus 로고    scopus 로고
    • An integral framework for information systems security management
    • Trček, D. (2003), "An integral framework for information systems security management", Computers & Security, Vol. 22 No. 4, pp. 337-60.
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 337-360
    • Trček, D.1
  • 34
    • 9744223613 scopus 로고    scopus 로고
    • Review: The resource-based view and information systems research: Review, extension, and suggestions for future research
    • Wade, M. and Hulland, J. (2004), "Review: the resource-based view and information systems research: review, extension, and suggestions for future research", MIS Quarterly, Vol. 28 No. 1, pp. 107-42.
    • (2004) MIS Quarterly , vol.28 , Issue.1 , pp. 107-142
    • Wade, M.1    Hulland, J.2
  • 35
    • 0141883323 scopus 로고    scopus 로고
    • Third generation risk management practices
    • Wright, M. (1999), "Third generation risk management practices", Computer Fraud & Security, Vol. 2, pp. 9-12.
    • (1999) Computer Fraud & Security , vol.2 , pp. 9-12
    • Wright, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.