메뉴 건너뛰기




Volumn 14, Issue 2, 2006, Pages 104-115

An empirical study of information security policy on information security elevation in Taiwan

Author keywords

Critical path analysis; Data security; Security products

Indexed keywords

CRITICAL PATH ANALYSIS; ELECTRONIC COMMERCE; INFORMATION MANAGEMENT; SOCIETIES AND INSTITUTIONS;

EID: 33745838617     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220610655861     Document Type: Article
Times cited : (36)

References (17)
  • 2
    • 33745869216 scopus 로고    scopus 로고
    • Security starts from within
    • July
    • Connolly, P.J. (2000), “Security starts from within”, Infoworld, July, pp. 39-40.
    • (2000) Infoworld , pp. 39-40
    • Connolly, P.J.1
  • 3
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: towards socio-organizational perspectives
    • Dhillon, G. and Backhouse, J. (2001), “Current directions in IS security research: towards socio-organizational perspectives”, Information Systems Journal, Vol. 11, pp. 127-53.
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 5
    • 0042363355 scopus 로고    scopus 로고
    • The application of information security policies in large UK-based organizations: an exploratory investigation
    • Fulford, H. and Doherty, N.F. (2003), “The application of information security policies in large UK-based organizations: an exploratory investigation”, Information Management & Computer Security, Vol. 11 No. 3, pp. 106-14.
    • (2003) Information Management & Computer Security , vol.11 , Issue.3 , pp. 106-114
    • Fulford, H.1    Doherty, N.F.2
  • 7
    • 0036299585 scopus 로고    scopus 로고
    • Security survey spring crop
    • Hinde, S. (2002), “Security survey spring crop”, Computers & Security, Vol. 21 No. 4, pp. 310-21.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 310-321
    • Hinde, S.1
  • 8
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy – what do international information security standards say?
    • Höne, K. and Eloff, J.H.P. (2002a), “Information security policy – what do international information security standards say?”, Computers & Security, Vol. 21 No. 5, pp. 402-9.
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 402-409
    • Höne, K.1    Eloff, J.H.P.2
  • 9
    • 0036613095 scopus 로고    scopus 로고
    • What makes an effective information security policy?
    • Höne, K. and Eloff, J.H.P. (2002b), “What makes an effective information security policy?”, Network Security, Vol. 6, pp. 14-16.
    • (2002) Network Security , vol.6 , pp. 14-16
    • Höne, K.1    Eloff, J.H.P.2
  • 12
    • 0032632869 scopus 로고    scopus 로고
    • Policy groups
    • Kühnhauser, W.E. (1999), “Policy groups”, Computers & Security, Vol. 18 No. 4, pp. 351-63.
    • (1999) Computers & Security , vol.18 , Issue.4 , pp. 351-363
    • Kühnhauser, W.E.1
  • 13
    • 0029545652 scopus 로고
    • A new model for information security policies
    • Lindup, K.R. (1995), “A new model for information security policies”, Computers & Security, Vol. 14 No. 8, pp. 691-5.
    • (1995) Computers & Security , vol.14 , Issue.8 , pp. 691-695
    • Lindup, K.R.1
  • 14
    • 0000133760 scopus 로고
    • Threats to information systems: today's reality, yesterday's understanding
    • Loch, K.D., Carr, H.H. and Warkentin, M.E. (1992), “Threats to information systems: today's reality, yesterday's understanding”, MIS Quarterly, Vol. 16 No. 2, pp. 173-86.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 15
    • 0031636915 scopus 로고    scopus 로고
    • Auditing the IT security function
    • Osborne, K. (1998), “Auditing the IT security function”, Computers & Security, Vol. 17 No. 1, pp. 34-41.
    • (1998) Computers & Security , vol.17 , Issue.1 , pp. 34-41
    • Osborne, K.1
  • 16
    • 0031095932 scopus 로고    scopus 로고
    • Evaluating security threats in mainframe and client/server environments
    • Ryan, S.D. and Bordoloi, B. (1997), “Evaluating security threats in mainframe and client/server environments”, Information & Management, Vol. 32 No. 3, pp. 137-46.
    • (1997) Information & Management , vol.32 , Issue.3 , pp. 137-146
    • Ryan, S.D.1    Bordoloi, B.2
  • 17
    • 0036299647 scopus 로고    scopus 로고
    • The development of access control policies for information technology systems
    • Ward, P. and Smith, C.L. (2002), “The development of access control policies for information technology systems”, Computers & Security, Vol. 21 No. 4, pp. 356-71.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 356-371
    • Ward, P.1    Smith, C.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.