메뉴 건너뛰기




Volumn 5, Issue 1, 2007, Pages 36-44

Is information security under control?: Investigating quality in information security management

Author keywords

[No Author keywords available]

Indexed keywords

ANTIVIRUS SOFTWARE; INFORMATION SECURITY RISK MANAGEMENT;

EID: 33847748221     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2007.11     Document Type: Article
Times cited : (84)

References (13)
  • 1
    • 12844250676 scopus 로고    scopus 로고
    • Multilevel Security: Reprise
    • O.S. Saydjari, "Multilevel Security: Reprise," IEEE Security & Privacy, vol. 2, no. 5, 2004, pp. 64-67.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.5 , pp. 64-67
    • Saydjari, O.S.1
  • 2
    • 18744366536 scopus 로고    scopus 로고
    • Computer Security: Quality Rather than Quantity
    • R.T. Mercuri, "Computer Security: Quality Rather than Quantity," Comm. ACM, vol. 45, no. 10, 2002, pp. 12-14.
    • (2002) Comm. ACM , vol.45 , Issue.10 , pp. 12-14
    • Mercuri, R.T.1
  • 3
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models for Management Decision-Making
    • D.W Straub and R.J. Welke, "Coping with Systems Risk: Security Planning Models for Management Decision-Making," MIS Quarterly, vol. 22, no. 4, 1998, pp. 441-470.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-470
    • Straub, D.W.1    Welke, R.J.2
  • 4
    • 0002698747 scopus 로고    scopus 로고
    • Information Systems Security Management in the New Millennium
    • G. Dhillon and J. Backhouse, "Information Systems Security Management in the New Millennium," Comm. ACM, vol. 43, no. 7, 2000, pp. 125-128.
    • (2000) Comm. ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 7
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the Gate: Threats to Information Security
    • M.E. Whitman, "Enemy at the Gate: Threats to Information Security," Comm. ACM, vol. 46, no. 8, 2003, pp. 91-95.
    • (2003) Comm. ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.E.1
  • 8
    • 1242263532 scopus 로고    scopus 로고
    • Why There Aren't More Information Security Research Studies
    • A.G. Kotulic and J.G. Clark, "Why There Aren't More Information Security Research Studies," Information & Management, vol. 41, 2004, pp. 597-607.
    • (2004) Information & Management , vol.41 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 9
    • 3042782049 scopus 로고    scopus 로고
    • What is Computer Security?
    • M. Bishop, "What is Computer Security?" IEEE Security & Privacy, vol. 1, no. 1, 2003, pp. 67-69.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 67-69
    • Bishop, M.1
  • 10
    • 33847703898 scopus 로고    scopus 로고
    • Riptech Internet Security Threat Report
    • T. Belchner et al., "Riptech Internet Security Threat Report," Riptech, 2002.
    • (2002) Riptech
    • Belchner, T.1
  • 11
    • 33847750071 scopus 로고    scopus 로고
    • The Internet Business Disruptions Benchmark Report
    • "The Internet Business Disruptions Benchmark Report," Aberdeen Group, 2004; www.aberdeen.com/summary/report/benchmark/ibd.asp.
    • (2004) Aberdeen Group
  • 12
  • 13
    • 0002373586 scopus 로고
    • Total Quality Control
    • A.V. Feigenbaum, "Total Quality Control," Harvard Business Rev., vol. 34, no. 6, 1956, p. 93.
    • (1956) Harvard Business Rev , vol.34 , Issue.6 , pp. 93
    • Feigenbaum, A.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.