메뉴 건너뛰기




Volumn , Issue , 2007, Pages 84-93

Elevating the discussion on security management the data centric paradigm

Author keywords

Data security; Management decision making; Resource management; Security

Indexed keywords

DECISION MAKING; INFORMATION MANAGEMENT; MATHEMATICAL MODELS; RISK ANALYSIS;

EID: 34748912976     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BDIM.2007.375015     Document Type: Conference Paper
Times cited : (14)

References (21)
  • 1
    • 34748828410 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse, A Chronology of Data Breaches, http://www.privacyrights.org/ar/ChronDataBreaches.htm
    • Privacy Rights Clearinghouse, "A Chronology of Data Breaches", http://www.privacyrights.org/ar/ChronDataBreaches.htm
  • 2
    • 34748874482 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse, How Many Identity Theft Victims Are There? What is the Impact? Summary of Survey Findings, http://www.privacyrights.org/ar/idtheftsurveys.htm
    • Privacy Rights Clearinghouse, "How Many Identity Theft Victims Are There? What is the Impact? Summary of Survey Findings", http://www.privacyrights.org/ar/idtheftsurveys.htm
  • 4
    • 84876010344 scopus 로고
    • Why Privacy is Important
    • Summer
    • J. Rachels, "Why Privacy is Important", Philosophy and Public Affairs, Vol. 4, No. 4 (Summer 1975), pp. 323-333.
    • (1975) Philosophy and Public Affairs , vol.4 , Issue.4 , pp. 323-333
    • Rachels, J.1
  • 5
    • 34748830754 scopus 로고    scopus 로고
    • Challenges and Trends in Information Management
    • Datenbank-Spektrum
    • K. Kailing, A. Löser and V.Markl, "Challenges and Trends in Information Management", Datenbank-Spektrum, Volume 6, Number 19, 2006, pp. 15-22.
    • (2006) , vol.6 , Issue.19 , pp. 15-22
    • Kailing, K.1    Löser, A.2    Markl, V.3
  • 8
    • 34748838821 scopus 로고    scopus 로고
    • Securities and Exchange Commission
    • Securities and Exchange Commission, "Sarbanes Oxley SEC Rules", http://www.sarbanes-oxley.com/section.php?level=1&pub_id=SEC-Rules.
    • Sarbanes Oxley SEC Rules
  • 10
    • 77953855120 scopus 로고    scopus 로고
    • International Organization for Standardization
    • International Organization for Standardization, "The ISO 17799 Directory", http://www.iso-17799.com/
    • The ISO 17799 Directory
  • 11
    • 4243109556 scopus 로고    scopus 로고
    • A model for evaluating IT security investments
    • H. Cavusoglu, B. Mishra and S. Raghunathan, "A model for evaluating IT security investments", Communications of the ACM, Vol 47, Issue 7, 2004, Pages 87-92.
    • (2004) Communications of the ACM , vol.47 , Issue.7 , pp. 87-92
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 12
    • 0038703577 scopus 로고    scopus 로고
    • Risk Analysis and the Security Survey
    • Boston, Butterworth
    • J. F. Broder, "Risk Analysis and the Security Survey", Publisher: Boston : Butterworth, 2000.
    • (2000) Publisher
    • Broder, J.F.1
  • 17
    • 0028513932 scopus 로고
    • Access Control: Principles and Practice
    • R. Sandhu and P. Samarati, "Access Control: Principles and Practice", IEEE Communications Magazine, vol. 32(9), pp. 40-48. 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 18
    • 34748826595 scopus 로고
    • Renewed Understanding of Access Control Policies
    • Baltimore, Maryland, U.S.A, pp, September
    • th National Computer Security Conference, Baltimore, Maryland, U.S.A., pp. 87-96, 20-23 September 1993.
    • (1993) th National Computer Security Conference
    • Abrams, M.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.