메뉴 건너뛰기




Volumn 26, Issue 2, 2007, Pages 177-182

Information security in networkable Windows-based operating system devices: Challenges and solutions

Author keywords

Information security; Management of security risks; Networkable devices; Organizational capabilities; Vendor user relationship

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; CATHODE RAY OSCILLOSCOPES; COMPUTER OPERATING SYSTEMS; NETWORK ARCHITECTURE; SALES;

EID: 33947117497     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.09.002     Document Type: Article
Times cited : (8)

References (11)
  • 2
    • 33947107162 scopus 로고    scopus 로고
    • Farahmand F, Navathe SB, et al., Managing vulnerabilities of information systems to security incidents. The 5th international conference on electronic commerce ICEC03 Pittsburgh, PA, USA; 2003.
  • 3
    • 2342465798 scopus 로고
    • Computer infectors: prevention, detection, and recovery
    • Joseph G.W., and Blanton J.E. Computer infectors: prevention, detection, and recovery. Information and Management 23 (1992) 205-216
    • (1992) Information and Management , vol.23 , pp. 205-216
    • Joseph, G.W.1    Blanton, J.E.2
  • 4
    • 0035479209 scopus 로고    scopus 로고
    • Security threats to Internet: a Korean multi-industry investigation
    • Jung B., Han I., et al. Security threats to Internet: a Korean multi-industry investigation. Information and Management 38 (2001) 487-498
    • (2001) Information and Management , vol.38 , pp. 487-498
    • Jung, B.1    Han, I.2
  • 5
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic A.G., and Clark J.G. Why there aren't more information security research studies. Information and Management 41 (2004) 597-607
    • (2004) Information and Management , vol.41 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 6
    • 15744399299 scopus 로고    scopus 로고
    • Security and risk management: a fundamental business issue
    • McAdams A. Security and risk management: a fundamental business issue. Information Management Journal 38 4 (2004) 36-44
    • (2004) Information Management Journal , vol.38 , Issue.4 , pp. 36-44
    • McAdams, A.1
  • 7
  • 8
    • 20844451793 scopus 로고    scopus 로고
    • Adopting a software security improvement program
    • Taylor D., and McGraw G. Adopting a software security improvement program. IEEE Security & Privacy 3 3 (2005) 88-91
    • (2005) IEEE Security & Privacy , vol.3 , Issue.3 , pp. 88-91
    • Taylor, D.1    McGraw, G.2
  • 9
    • 3042812983 scopus 로고    scopus 로고
    • The ten deadly sins of information security management
    • von Solms B., and von Solms R. The ten deadly sins of information security management. Computers and Security 23 (2004) 371-376
    • (2004) Computers and Security , vol.23 , pp. 371-376
    • von Solms, B.1    von Solms, R.2
  • 10
    • 19944396489 scopus 로고    scopus 로고
    • From information security to business security
    • von Solms B., and von Solms R. From information security to business security. Computers and Security 24 (2005) 271-273
    • (2005) Computers and Security , vol.24 , pp. 271-273
    • von Solms, B.1    von Solms, R.2
  • 11
    • 0141917862 scopus 로고
    • A framework for information security evaluation
    • von Solms R., van de Haar H., et al. A framework for information security evaluation. Information and Management 26 (1994) 143-153
    • (1994) Information and Management , vol.26 , pp. 143-153
    • von Solms, R.1    van de Haar, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.