메뉴 건너뛰기




Volumn 12, Issue 3, 2008, Pages 22-30

Searching for the right fit: Balancing IT security management model trade-offs

Author keywords

Book reviews; Computer security professionals; Internet; Internet security; Interviews; Organizations; Security; Security management models; Standards; Training

Indexed keywords

INFORMATION TECHNOLOGY; PERSONNEL TRAINING; STANDARDS; USABILITY ENGINEERING;

EID: 44449146478     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2008.61     Document Type: Article
Times cited : (7)

References (8)
  • 1
    • 33646685242 scopus 로고    scopus 로고
    • IT Security: Protecting Organizations in Spite of Themselves
    • May/June
    • D.A. Siegel, B. Reid, and S.M. Dray, "IT Security: Protecting Organizations in Spite of Themselves," Interactions, May/June 2006, pp. 20-27.
    • (2006) Interactions , pp. 20-27
    • Siegel, D.A.1    Reid, B.2    Dray, S.M.3
  • 2
    • 33749671871 scopus 로고    scopus 로고
    • Framing the Frameworks: A Review of IT Governance Research
    • A. Brown and G.G. Grant, "Framing the Frameworks: A Review of IT Governance Research," Comm. of the Assoc. for Information Systems vol. 15, 2005, pp. 696-712.
    • (2005) Comm. of the Assoc. for Information Systems , vol.15 , pp. 696-712
    • Brown, A.1    Grant, G.G.2
  • 4
    • 44449106001 scopus 로고    scopus 로고
    • G. Killcrece et al., Organizational Models for Computer Security Incident Response Teams (CSIRTS), tech. report CMU/SEI-2003-HB-001 ADA421684, Software Eng. Institute, Carnegie Mellon Univ., 2003; www.sci.emu.edu/publications/documents/03.reports/03hb001.html.
    • G. Killcrece et al., Organizational Models for Computer Security Incident Response Teams (CSIRTS), tech. report CMU/SEI-2003-HB-001 ADA421684, Software Eng. Institute, Carnegie Mellon Univ., 2003; www.sci.emu.edu/publications/documents/03.reports/03hb001.html.
  • 5
    • 36849085382 scopus 로고    scopus 로고
    • Toward Understanding IT Security Professionals and Their Tools
    • Proc. Symp. Universal Privacy and Security
    • D. Botta et al., "Toward Understanding IT Security Professionals and Their Tools," Proc. Symp. Universal Privacy and Security, ACM Int'l Conf. Proc. Series, vol. 229, 2007, pp. 100-111.
    • (2007) ACM Int'l Conf. Proc. Series , vol.229 , pp. 100-111
    • Botta, D.1
  • 6
    • 44449132553 scopus 로고    scopus 로고
    • Searching for the Right Fit: A Case Study of IT Security Management Model Trade-Offs
    • LERSSE-TR-2007-03, Laboratory for Education and Research in Secure Systems Eng, Univ. of British Columbia
    • K. Hawkey, K. Muldner, and K. Beznosov, Searching for the Right Fit: A Case Study of IT Security Management Model Trade-Offs, tech. report LERSSE-TR-2007-03, Laboratory for Education and Research in Secure Systems Eng., Univ. of British Columbia, 2007; http:// lersse-dl.ece.ubc.ca/search.py?recid-139.
    • (2007) tech. report
    • Hawkey, K.1    Muldner, K.2    Beznosov, K.3
  • 7
    • 0002466081 scopus 로고
    • Transactive Memory: A Contemporary Analysis of the Group Mind
    • B. Mullen and G.R. Goethals, eds, Springer-Verlag
    • D.M. Wegner, "Transactive Memory: A Contemporary Analysis of the Group Mind," Theories of Group Behavior, B. Mullen and G.R. Goethals, eds., Springer-Verlag, 1986, pp. 185-208.
    • (1986) Theories of Group Behavior , pp. 185-208
    • Wegner, D.M.1
  • 8
    • 44449090428 scopus 로고    scopus 로고
    • IT Governance: Stop the Pendulum!
    • 12 Jan, 10801,88888,00.html
    • D. Lewis, "IT Governance: Stop the Pendulum!" Computer World, 12 Jan. 2004; www.computerworld.com/managementtopics/management/story/ 0,10801,88888,00.html.
    • (2004) Computer World
    • Lewis, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.