메뉴 건너뛰기




Volumn 26, Issue 1, 2007, Pages 44-55

Bridging the gap between general management and technicians - A case study on ICT security in a developing country

Author keywords

ICT security management; ICT related risks; Management; Organisations; Perception problem; Technicians

Indexed keywords

INFORMATION MANAGEMENT; PROBLEM SOLVING; SOCIETIES AND INSTITUTIONS; STRATEGIC PLANNING;

EID: 33846796373     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.10.007     Document Type: Article
Times cited : (7)

References (21)
  • 2
    • 33846821514 scopus 로고    scopus 로고
    • Bakari JK. Towards a holistic approach for managing ICT security in developing countries: a case study of Tanzania. Ph.L. thesis, SU-KTH, Stockholm. DSV report Series 05-011; 2005.
  • 3
    • 33749040748 scopus 로고    scopus 로고
    • Bakari JK, Tarimo CN, Yngström L, Magnusson C. State of ICT security management in the institutions of higher learning in developing countries: Tanzania case study. In: The 5th IEEE ICALT, Kaohsiung, Taiwan; 2005a. p. 1007-11.
  • 4
    • 34250156409 scopus 로고    scopus 로고
    • Bakari JK, Magnusson C, Tarimo CN, Yngström, L. Ensuring ICT risks using EMitL tool: an empirical study, IFIP TC-11 WG 11.1 & WG 11.5 joint working conference on security management, integrity, and internal control in information systems, December 1-2, Fairfax, Virginia, Washington, US; 2005b. p. 157-73.
  • 6
    • 33846807247 scopus 로고    scopus 로고
    • Bjorck F. Security Scandinavian style, interpreting the practice of managing information security in organisations. Ph.L. theses, Department of Computer and Systems Science, University of Stockholm and the Royal Institute of Technology, Stockholm; 2001.
  • 8
    • 33846823049 scopus 로고    scopus 로고
    • Casmir R. A dynamic and adaptive information security awareness (DAISA) approach. Ph.D Thesis, SU-KTH, Stockholm; 2005. No. 05-020.
  • 9
    • 33846823060 scopus 로고    scopus 로고
    • Chaula JA. Security metrics and public key infrastructure interoperability testing. Ph.L Thesis, SU-KTH, Stockholm, DSV report Series 03-021; 2003.
  • 11
    • 33846808831 scopus 로고    scopus 로고
    • ISACA. ; 2005 [last accessed on 20 October 2005].
  • 12
    • 33846819997 scopus 로고    scopus 로고
    • ISO 17799 Standard.
  • 13
    • 33846814929 scopus 로고    scopus 로고
    • ITIL. ; 2005 [last accessed on April 2005].
  • 14
    • 33846826753 scopus 로고    scopus 로고
    • Kowalski S. IT insecurity: a multi-disciplinary inquiry. Ph.D. Thesis, Department of Computer and Systems Sciences, University of Stockholm and the Royal Institute of Technology, Stockholm; 1994. ISBN: 91-7153-207-2.
  • 15
    • 33846840556 scopus 로고    scopus 로고
    • Magnusson C. Hedging shareholders value in an IT dependent business society. The framework Brits. Ph.D Thesis, Department of Computer and Systems Science, University of Stockholm and the Royal Institute of Technology, Stockholm; 1999.
  • 16
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • 0167-4048
    • Solms B.V., and Solms R.V. The 10 deadly sins of information security management. Computers & Security, 0167-4048 23 5 (2004) 371-376
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 371-376
    • Solms, B.V.1    Solms, R.V.2
  • 17
    • 17844364638 scopus 로고    scopus 로고
    • Information security governance: COBIT or ISO 17799 or both?
    • Solms B.V. Information security governance: COBIT or ISO 17799 or both?. Computer & Security 24 (2005) 99-104
    • (2005) Computer & Security , vol.24 , pp. 99-104
    • Solms, B.V.1
  • 18
    • 10644289334 scopus 로고    scopus 로고
    • A framework for the governance of information security
    • (Elsevier Ltd.)
    • Posthumus S., and Solms R.V. A framework for the governance of information security. (Elsevier Ltd.). Computers & Security 23 (2004) 638-646
    • (2004) Computers & Security , vol.23 , pp. 638-646
    • Posthumus, S.1    Solms, R.V.2
  • 19
    • 84879743356 scopus 로고    scopus 로고
    • Posthumus S, Solms RV. A responsibility framework for information security. In: IFIP TC-11 WG 11.1 & WG 11.5 joint working conference on security management, integrity, and internal control in information systems, Fairfax, Virginia, Washington, US; 1-2 December 2005. p 205-21.
  • 20
    • 33846816499 scopus 로고    scopus 로고
    • Tarimo C.N. Towards a generic framework for implementation and use of intrusion detection systems. Stockholm University/Royal Institute of Technology, Report series No. 2003-022, SU-KTH/DSV/R - 2003-SE; December 2003.
  • 21
    • 33846838648 scopus 로고    scopus 로고
    • Wilson M, Hash J. Building an information technology security awareness and training program. NIST Special publication 800-50; October 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.