메뉴 건너뛰기




Volumn 48, Issue 3, 2008, Pages 15-19

The chief information security officer: An analysis of the skills required for success

Author keywords

Chief information security officer; Governance; IT management The Chief Information Security Officer: An analysis of the skills required for success; Security

Indexed keywords

CHIEF INFORMATION SECURITY OFFICERS; COMPETITIVE BUSINESS; GOVERNANCE; IT SECURITY; SECURITY;

EID: 44449088923     PISSN: 08874417     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (29)

References (15)
  • 1
    • 84886765444 scopus 로고    scopus 로고
    • How to Manage Security Halfway Around the World
    • Datz, T. (2005) How to Manage Security Halfway Around the World. CISO, 3(4) pp. 46-48.
    • (2005) CISO , vol.3 , Issue.4 , pp. 46-48
    • Datz, T.1
  • 4
    • 44449173424 scopus 로고    scopus 로고
    • Price of Security Breaches
    • Hall, Mark. (2005) Price of Security Breaches, Computer-world 39(46) pp. 8.
    • (2005) Computer-world , vol.39 , Issue.46 , pp. 8
    • Hall, M.1
  • 5
    • 44449129868 scopus 로고    scopus 로고
    • So You Want to Be a CISO? The Pay's Good-But It's Not Easy
    • IOMA, 1,-10
    • IOMA. (2005) So You Want to Be a CISO? The Pay's Good-But It's Not Easy. Security Director's Report. 5(7) 1,-10.
    • (2005) Security Director's Report , vol.5 , Issue.7
  • 6
    • 68549093911 scopus 로고    scopus 로고
    • What is a Chief Privacy Officer? An Analysis Based Upon Mintzberg ' s Taxonomy of Managerial Roles
    • Kayworth, T., Brocato, L., and Whitten, D. (2005) What is a Chief Privacy Officer? An Analysis Based Upon Mintzberg ' s Taxonomy of Managerial Roles. Communications of the AIS 6(6).
    • (2005) Communications of the AIS , vol.6 , Issue.6
    • Kayworth, T.1    Brocato, L.2    Whitten, D.3
  • 7
    • 84876630178 scopus 로고    scopus 로고
    • Kirk, Jeremy. (2005) Survey: Execs see security concerns over IP convergence, Computerworld http://www.computerworld.com/networkingtopics/ networking/story/0,10801,106057,00.html Nov 8, 2005 issue.
    • Kirk, Jeremy. (2005) Survey: Execs see security concerns over IP convergence, Computerworld http://www.computerworld.com/networkingtopics/ networking/story/0,10801,106057,00.html Nov 8, 2005 issue.
  • 8
    • 13844275774 scopus 로고    scopus 로고
    • Assessing and Quantifying the Loss of Network Intrusion
    • Kros, J., Foltz, C., and Metcalf, C. (2004/05) Assessing and Quantifying the Loss of Network Intrusion. Journal of Computer Information Systems 45(2), pp. 36-43).
    • (2005) Journal of Computer Information Systems , vol.45 , Issue.2 , pp. 36-43
    • Kros, J.1    Foltz, C.2    Metcalf, C.3
  • 9
    • 84876605381 scopus 로고    scopus 로고
    • Kubilus, N. (2004) IT and Security: Converging Roles. ComputerWorld. Nov 22, 2004. pp. 44.
    • Kubilus, N. (2004) IT and Security: Converging Roles. ComputerWorld. Nov 22, 2004. pp. 44.
  • 10
    • 24644502723 scopus 로고    scopus 로고
    • Analysis of Skill Requirements For Systems Analysts in Fortune 500 Organizations
    • Lee, C. (2005) Analysis of Skill Requirements For Systems Analysts in Fortune 500 Organizations. Journal of Computer Information Systems 45(4) pp. 84-92.
    • (2005) Journal of Computer Information Systems , vol.45 , Issue.4 , pp. 84-92
    • Lee, C.1
  • 11
    • 0002236796 scopus 로고
    • Managerial Work: Analysis for Observation
    • Mintzberg, H. (1971) Managerial Work: Analysis for Observation, Management Science, (18)2, pp. 97-110.
    • (1971) Management Science , vol.2 , Issue.18 , pp. 97-110
    • Mintzberg, H.1
  • 15
    • 33747481695 scopus 로고    scopus 로고
    • Secure Information Sharing in Internet-Based Supply Chain Management Systems
    • Zhang, C. and Li, S. (2006) Secure Information Sharing in Internet-Based Supply Chain Management Systems, Journal of Computer Information Systems 46(4) pp. 18-24.
    • (2006) Journal of Computer Information Systems , vol.46 , Issue.4 , pp. 18-24
    • Zhang, C.1    Li, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.