메뉴 건너뛰기




Volumn 3, Issue 3, 2007, Pages 352-373

Applying ISO 17799:2005 in information security management

Author keywords

Information security management; Information security management system; ISO 17799:2005; Risk management; Security management

Indexed keywords


EID: 34547121214     PISSN: 17408849     EISSN: 17408857     Source Type: Journal    
DOI: 10.1504/IJSS.2007.013754     Document Type: Article
Times cited : (8)

References (23)
  • 1
    • 27644444688 scopus 로고    scopus 로고
    • A new approach for building secure applications based on internal infrastructure
    • Ali, H.A. (2005) 'A new approach for building secure applications based on internal infrastructure, Int. J Computer Applications in Technology, Vol. 24, pp. 144-155.
    • (2005) Int. J Computer Applications in Technology , vol.24 , pp. 144-155
    • Ali, H.A.1
  • 2
    • 33644542600 scopus 로고    scopus 로고
    • A usability study of internet privacy policies for state and commercial website
    • Becker, S.A. (2004) 'A usability study of internet privacy policies for state and commercial website', Int. J. Service and Standards, Vol. 1, pp.52-68.
    • (2004) Int. J. Service and Standards , vol.1 , pp. 52-68
    • Becker, S.A.1
  • 3
    • 34547124969 scopus 로고    scopus 로고
    • BSI, BS 7799-1 (1999a) 'Information Security Management Part 1: Code of Practice for Information Security Management System', British Security Institute: UK.
    • BSI, BS 7799-1 (1999a) 'Information Security Management Part 1: Code of Practice for Information Security Management System', British Security Institute: UK.
  • 4
    • 34547109998 scopus 로고    scopus 로고
    • BSI, BS 7799-2 (1999b) 'Information Security Management Part 2: Specification for Information Security Management System', British Security Institute: UK.
    • BSI, BS 7799-2 (1999b) 'Information Security Management Part 2: Specification for Information Security Management System', British Security Institute: UK.
  • 6
    • 34547111417 scopus 로고    scopus 로고
    • Computer crime and security: The perceptions and experiences of corporate security directors
    • Carter, D.L. and Katz, A.J. (1996) 'Computer crime and security: the perceptions and experiences of corporate security directors', Security Journal, Vol. 7, pp. 101-108.
    • (1996) Security Journal , vol.7 , pp. 101-108
    • Carter, D.L.1    Katz, A.J.2
  • 8
    • 0030417096 scopus 로고    scopus 로고
    • The information security chain in a company
    • Finne, T. (1996) 'The information security chain in a company', Computer and Seeurity, Vol. 15, pp.297-316.
    • (1996) Computer and Seeurity , vol.15 , pp. 297-316
    • Finne, T.1
  • 9
    • 34547093061 scopus 로고    scopus 로고
    • ISM Information security management, Account and Password Management Policy Version 1.4, 03/2004, University of Auckland, New Zealand. Available at: http://www
    • ISM (Information security management), Account and Password Management Policy Version 1.4, 03/2004, University of Auckland, New Zealand. Available at: http://www.auckland.ac.nz/security/policies and statutes.htm
  • 11
    • 34547135575 scopus 로고    scopus 로고
    • Information technology, - Securitv Techniques Code of Practice.1br Information
    • ISO
    • ISO (2000) Information technology, - Securitv Techniques Code of Practice.1br Information Security Management, ISO 1799:2000(E).
    • (2000) Security Management , vol.ISO 1799
  • 13
    • 1442303690 scopus 로고    scopus 로고
    • Development of a measure for the information technology infrastructure construct
    • Lewis, B.R. and Byrd, T.A. (2003) 'Development of a measure for the information technology infrastructure construct', European Journal of Information Systems, Vol. 12, pp.93-109.
    • (2003) European Journal of Information Systems , vol.12 , pp. 93-109
    • Lewis, B.R.1    Byrd, T.A.2
  • 14
    • 34547124715 scopus 로고    scopus 로고
    • NSTISSI (National Security Telecommunications and Information Systems Security Instruction) (1999) No. 4009, January.
    • NSTISSI (National Security Telecommunications and Information Systems Security Instruction) (1999) No. 4009, January.
  • 15
    • 34547121848 scopus 로고    scopus 로고
    • Middleware for semantic-based security and safety management of open services
    • Poslad, S., Tan, J.J., Huang, X. and Zuo, L. (2005) 'Middleware for semantic-based security and safety management of open services', Int. J Web and Grid Services, Vol. 1, pp.305-327.
    • (2005) Int. J Web and Grid Services , vol.1 , pp. 305-327
    • Poslad, S.1    Tan, J.J.2    Huang, X.3    Zuo, L.4
  • 16
    • 0041983746 scopus 로고    scopus 로고
    • Management tradeoffs in anti-virus strategies
    • Post, G. and Kagan, A. (2000) 'Management tradeoffs in anti-virus strategies', Information and Management, Vol. 37, pp. 13-24.
    • (2000) Information and Management , vol.37 , pp. 13-24
    • Post, G.1    Kagan, A.2
  • 18
    • 33645901634 scopus 로고    scopus 로고
    • An assessment of biometric identities as a standard for e-govem ment services
    • Scott, M., Action, T. and Hughes, M. (2005) 'An assessment of biometric identities as a standard for e-govem ment services', Int. J. Service and Standards, Vol. 1, pp.271-286.
    • (2005) Int. J. Service and Standards , vol.1 , pp. 271-286
    • Scott, M.1    Action, T.2    Hughes, M.3
  • 19
    • 33644533193 scopus 로고    scopus 로고
    • Electronic data interchange and financial electronic data interchange: Threats and opportunities for financial accounting
    • Seetharaman, A., Sreenivasan, J. and Murugeson, M. (2006) 'Electronic data interchange and financial electronic data interchange: threats and opportunities for financial accounting', Int. J. Services and Standards, Vol. 2, pp. 137-153.
    • (2006) Int. J. Services and Standards , vol.2 , pp. 137-153
    • Seetharaman, A.1    Sreenivasan, J.2    Murugeson, M.3
  • 20
    • 34249087381 scopus 로고    scopus 로고
    • Integrated e-enterprise security design and implementation: A case study of e-service in Supply chain management
    • Shin, S.C. and Wen, H.J. (2005) 'Integrated e-enterprise security design and implementation: a case study of e-service in Supply chain management', Int. J Electronic Business, Vol. 3, pp. 154-173.
    • (2005) Int. J Electronic Business , vol.3 , pp. 154-173
    • Shin, S.C.1    Wen, H.J.2
  • 21
    • 33745040092 scopus 로고    scopus 로고
    • Linking secure reverse auction with web service
    • Shin, D.H., Huang, S.Y and Lin, B. (2006) Linking secure reverse auction with web service', Int. J. Services and Standard, Vol. 2, pp. 15-31.
    • (2006) Int. J. Services and Standard , vol.2 , pp. 15-31
    • Shin, D.H.1    Huang, S.Y.2    Lin, B.3
  • 22
    • 33745027520 scopus 로고    scopus 로고
    • Exploring the acceptability of biometrics and fingerprint technologies
    • Smith, A.D. (2005) 'Exploring the acceptability of biometrics and fingerprint technologies', Int. J Services andStandards, Vol. 1, pp.453-481.
    • (2005) Int. J Services andStandards , vol.1 , pp. 453-481
    • Smith, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.