메뉴 건너뛰기




Volumn 16, Issue 1, 2008, Pages 58-73

A practical application of CMM to medical security capability

Author keywords

Data security; Governance; Information systems; Medical informatics

Indexed keywords

INFORMATION SYSTEMS; INFORMATION TECHNOLOGY; SECURITY OF DATA;

EID: 40949149568     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220810862751     Document Type: Article
Times cited : (32)

References (36)
  • 1
    • 23744501762 scopus 로고    scopus 로고
    • "Defining a requirements process improvement model"
    • Beecham, S., Hall, T. and Rainer, A. (2005), "Defining a requirements process improvement model", Software Quality Journal, Vol. 13 No. 3, pp. 247-80.
    • (2005) Software Quality Journal , vol.13 , Issue.3 , pp. 247-280
    • Beecham, S.1    Hall, T.2    Rainer, A.3
  • 2
    • 0346452788 scopus 로고    scopus 로고
    • "Selecting continuous training program and activities for computer professionals"
    • Boulet, M-M., Dupuis, C. and Belkhiter, N. (2001), "Selecting continuous training program and activities for computer professionals", Computers and Education, Vol. 36 No. 1, pp. 83-94.
    • (2001) Computers and Education , vol.36 , Issue.1 , pp. 83-94
    • Boulet, M.-M.1    Dupuis, C.2    Belkhiter, N.3
  • 5
    • 40949118368 scopus 로고    scopus 로고
    • Center for Software Engineering available at:
    • Center for Software Engineering (2002), COCOMO, available at: sunset.usc.edu/research/COCOMOII/.
    • (2002) COCOMO
  • 6
    • 40949133631 scopus 로고    scopus 로고
    • CERT available at:
    • CERT (2003), OCTAVE, available at: www.cert.org/octave/.
    • (2003) OCTAVE
  • 9
    • 40949091773 scopus 로고    scopus 로고
    • Dictionary.com available at:
    • Dictionary.com (2007), available at: Dictionary.reference.com/.
    • (2007)
  • 10
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: A survey of end-users
    • Furnell, S.M., Jusoh, A. and Katsabas, D. (2006), "The challenges of understanding and using security: A survey of end-users", Computers and Security, Vol. 25 No. 1, pp. 27-35.
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 27-35
    • Furnell, S.M.1    Jusoh, A.2    Katsabas, D.3
  • 11
    • 37849185083 scopus 로고    scopus 로고
    • "Are CMM program investments beneficial? Analyzing past studies"
    • Galin, D. and Avrahami, M. (2006), "Are CMM program investments beneficial? Analyzing past studies", IEEE Software, Vol. 23 No. 6, pp. 81-7.
    • (2006) IEEE Software , vol.23 , Issue.6 , pp. 81-87
    • Galin, D.1    Avrahami, M.2
  • 13
    • 40949097186 scopus 로고    scopus 로고
    • "The regulation of information security"
    • Heiser, J.G. (2004), "The regulation of information security", Intermedia, Vol. 32 No. 2, p. 29.
    • (2004) Intermedia , vol.32 , Issue.2 , pp. 29
    • Heiser, J.G.1
  • 16
    • 84870795656 scopus 로고    scopus 로고
    • "The relationship between the SSE-CMM and IT security guidance documentation"
    • available at:
    • Hopkinson, J.P. (2001), "The relationship between the SSE-CMM and IT security guidance documentation", The SSE-CMM and IT Security Guidance Documentation, available at: www.issea.org/docs/ sse-guides_2001.pdf.
    • (2001) The SSE-CMM and IT Security Guidance Documentation
    • Hopkinson, J.P.1
  • 17
    • 33644680151 scopus 로고    scopus 로고
    • "Selection priority of process areas based on CMMI continuous representation"
    • Huang, S-J. and Han, W-M. (2006), "Selection priority of process areas based on CMMI continuous representation", International Journal of Information Management, Vol. 43 No. 3, pp. 297-307.
    • (2006) International Journal of Information Management , vol.43 , Issue.3 , pp. 297-307
    • Huang, S.-J.1    Han, W.-M.2
  • 19
    • 70349572829 scopus 로고    scopus 로고
    • ISACA available at:
    • ISACA (2006), Information security governance, available at: www.isaca.org/Content/NavigationMenu/Security/CISM_Certification/ Exam_Information1/Content_Areas1/Information_Security_Governance.htm.
    • (2006) Information Security Governance
  • 20
    • 40949146387 scopus 로고    scopus 로고
    • ISACA available at:
    • ISACA (2007), COBIT, available at: www.isaca.org/template.cfm?Section= COBIT6.
    • (2007) COBIT
  • 21
    • 33645988424 scopus 로고    scopus 로고
    • "ISO/IEC 17799:2005 information technology - Security techniques - Code of practice for information security management"
    • ISO available at:
    • ISO (2005), "ISO/IEC 17799:2005 information technology - security techniques - code of practice for information security management", available at: www.iso.ch/iso/en/prods-services/popstds/ informationsecurity.html.
    • (2005)
  • 22
    • 0347412022 scopus 로고    scopus 로고
    • "An exploration of the relationship between software development process maturity and project performance"
    • Jiang, J.J., Klein, G., Hwang, H-G., Huang, J. and Hung, S-Y. (2004), "An exploration of the relationship between software development process maturity and project performance", Information & Management, Vol. 41 No. 3, pp. 279-88.
    • (2004) Information & Management , vol.41 , Issue.3 , pp. 279-288
    • Jiang, J.J.1    Klein, G.2    Hwang, H.-G.3    Huang, J.4    Hung, S.-Y.5
  • 23
    • 9944237270 scopus 로고    scopus 로고
    • "Evaluating the user-centredness of development organisations: Conclusions and implications from empirical usability capability maturity assessments"
    • Jokela, T. (2004), "Evaluating the user-centredness of development organisations: Conclusions and implications from empirical usability capability maturity assessments", Interacting with Computers, Vol. 16 No. 6, pp. 1095-132.
    • (2004) Interacting With Computers , vol.16 , Issue.6 , pp. 1095-1132
    • Jokela, T.1
  • 25
    • 85007731052 scopus 로고    scopus 로고
    • "Computerisation and health care: Some worries behind the promises"
    • Neame, R. and Kluge, E-H. (1999), "Computerisation and health care: some worries behind the promises", British Medical Journal, Vol. 319 No. 7220, p. 1295.
    • (1999) British Medical Journal , vol.319 , Issue.7220 , pp. 1295
    • Neame, R.1    Kluge, E.-H.2
  • 26
    • 6444239461 scopus 로고    scopus 로고
    • "A maturity model for the implementation of software process improvement: An empirical study"
    • Niazi, M., Wilson, D. and Zowghi, D. (2005), "A maturity model for the implementation of software process improvement: An empirical study", The Journal of Systems and Software, Vol. 74 No. 2, p. 155.
    • (2005) The Journal of Systems and Software , vol.74 , Issue.2 , pp. 155
    • Niazi, M.1    Wilson, D.2    Zowghi, D.3
  • 27
    • 40949158262 scopus 로고    scopus 로고
    • "Surviving the quagmire of process models, integrated models, and standards"
    • Paulk, M.C. (2004), "Surviving the quagmire of process models, integrated models, and standards", Annual Quality Congress Proceedings, Vol. 58, pp. 429-38.
    • (2004) Annual Quality Congress Proceedings , vol.58 , pp. 429-438
    • Paulk, M.C.1
  • 30
    • 18844430775 scopus 로고    scopus 로고
    • "An alternative model for measuring the success of IS projects: The GPIS model"
    • Saleh, Y. and Alshawi, M. (2005), "An alternative model for measuring the success of IS projects: The GPIS model", Journal of Enterprise Information Management, Vol. 18 No. 1, pp. 47-63.
    • (2005) Journal of Enterprise Information Management , vol.18 , Issue.1 , pp. 47-63
    • Saleh, Y.1    Alshawi, M.2
  • 31
    • 33746927551 scopus 로고    scopus 로고
    • "Utilization of statistical process control (SPC) in emergent software organizations: Pitfalls and suggestions"
    • Sargut, K.U. and Demirörs, O. (2006), "Utilization of statistical process control (SPC) in emergent software organizations: pitfalls and suggestions", Software Quality Journal, Vol. 14 No. 2, pp. 135-57.
    • (2006) Software Quality Journal , vol.14 , Issue.2 , pp. 135-157
    • Sargut, K.U.1    Demirörs, O.2
  • 33
    • 40949120415 scopus 로고    scopus 로고
    • Software Engineering Institute available at:
    • Software Engineering Institute (2006), What is CMMI?, available at: www.sei.cmu.edu/cmmi/general/general.html.
    • (2006) What Is CMMI?
  • 34
    • 84884825086 scopus 로고    scopus 로고
    • University of Massachusetts Dartmouth available at:
    • University of Massachusetts Dartmouth (n.d.), "SEI capability maturity model", available at: www2.umassd.edu/swpi/ processframework/cmm/cmm.html.
    • "SEI Capability Maturity Model"
  • 35
    • 40949157392 scopus 로고    scopus 로고
    • "Information governance: A model for security in medical practice"
    • Williams, P.A.H. (2007a), "Information governance: A model for security in medical practice", Journal of Digital Forensics, Security and Law, Vol. 2 No. 1.
    • (2007) Journal of Digital Forensics, Security and Law , vol.2 , Issue.1
    • Williams, P.A.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.