메뉴 건너뛰기




Volumn 16, Issue 3, 2008, Pages 251-270

Information security management objectives and practices: A parsimonious framework

Author keywords

Communication technology; Data security

Indexed keywords

ACCESS CONTROL; INDUSTRIAL MANAGEMENT; INFORMATION MANAGEMENT; INFORMATION SERVICES; RELIABILITY; SECURITY SYSTEMS; STANDARDIZATION; STANDARDS;

EID: 49249127269     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220810893207     Document Type: Article
Times cited : (65)

References (36)
  • 1
    • 49249127698 scopus 로고    scopus 로고
    • available at: (accessed February 2007)
    • Avolio, F. (2000), "Best practices in network security", available at: www.networkcomputing.com/1105/1105f2.html?ls=NCJS_1105bt (accessed February 2007).
    • (2000) "Best Practices in Network Security"
    • Avolio, F.1
  • 2
    • 49249130061 scopus 로고    scopus 로고
    • "Information systems security: Principles and perspectives"
    • Sprint E/Solutions White Paper, Overland Park, KS
    • Bachman, D. (2002), "Information systems security: Principles and perspectives", Sprint E/Solutions White Paper, Overland Park, KS.
    • (2002)
    • Bachman, D.1
  • 3
    • 12244306739 scopus 로고    scopus 로고
    • An information security meta-policy for emergent organizations
    • Baskerville, R. and Siponen, M. (2002), "An information security meta-policy for emergent organizations", Journal of Logistics Information Management, Vol. 15 Nos 5/6, pp. 337-46.
    • (2002) Journal of Logistics Information Management , vol.15 , Issue.5-6 , pp. 337-346
    • Baskerville, R.1    Siponen, M.2
  • 6
    • 49249098577 scopus 로고    scopus 로고
    • available at: (accessed February 2007)
    • Briney, A. and Prince, F. (2002), "Does size matter?", available at: www.infosecuritymag.com/2002/sep/2002survey.pdf (accessed February 2007).
    • (2002) "Does Size Matter?"
    • Briney, A.1    Prince, F.2
  • 10
    • 23044525969 scopus 로고    scopus 로고
    • "Current directions in IS security research: Towards socio-organizational perspectives"
    • Dhillon, G. and Blackhouse, J. (2001), "Current directions in IS security research: Towards socio-organizational perspectives", Information Systems Journal, Vol. 11 No. 2, pp. 127-53.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Blackhouse, J.2
  • 11
    • 33744830087 scopus 로고    scopus 로고
    • "Value-focused assessment of information system security in organizations"
    • Dhillon, G. and Torkzadeh, G. (2006), "Value-focused assessment of information system security in organizations", Information Systems Journal, Vol. 16 No. 3, pp. 293-314.
    • (2006) Information Systems Journal , vol.16 , Issue.3 , pp. 293-314
    • Dhillon, G.1    Torkzadeh, G.2
  • 12
    • 77949838547 scopus 로고    scopus 로고
    • EarthWeb available at: (accessed February 2007)
    • EarthWeb (2003), "IT management", available at: Http:// itmanagement.webopedia.com/TERM/N/nonrepudiation.html (accessed February 2007).
    • (2003) "IT Management"
  • 13
    • 49249083359 scopus 로고    scopus 로고
    • "Information security becomes a business priority"
    • Filipek, R. (2007), "Information security becomes a business priority", Internal Auditor, Vol. 64 No. 1, p. 18.
    • (2007) Internal Auditor , vol.64 , Issue.1 , pp. 18
    • Filipek, R.1
  • 14
    • 0002042413 scopus 로고
    • "The 9 to 5 underground: Are you policing computer crimes?"
    • Hoffer, J. and Straub, D. (1989), "The 9 to 5 underground: Are you policing computer crimes?", Sloan Management Review, Vol. 30 No. 4, pp. 35-43.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-43
    • Hoffer, J.1    Straub, D.2
  • 17
    • 49249119755 scopus 로고    scopus 로고
    • "Improved security through information security governance"
    • Fall (in press)
    • Johnston, A. and Hale, R. (2007), "Improved security through information security governance", Communications of the ACM, Fall (in press).
    • (2007) Communications of the ACM
    • Johnston, A.1    Hale, R.2
  • 19
    • 0033995591 scopus 로고    scopus 로고
    • "Information technology in the retail food industry"
    • Kinsey, J. and Ashman, S. (2000), "Information technology in the retail food industry", Technology in Society, Vol. 22 No. 1, pp. 83-96.
    • (2000) Technology in Society , vol.22 , Issue.1 , pp. 83-96
    • Kinsey, J.1    Ashman, S.2
  • 23
    • 49249132793 scopus 로고    scopus 로고
    • "A socio-technical perspective on information security knowledge and attitudes"
    • unpublished dissertation, The University of Texas at Austin, Austin, TX
    • Long, C. (1999), "A socio-technical perspective on information security knowledge and attitudes", unpublished dissertation, The University of Texas at Austin, Austin, TX.
    • (1999)
    • Long, C.1
  • 24
    • 4243084359 scopus 로고    scopus 로고
    • "Standards insecurity"
    • Mercuri, R. (2003), "Standards insecurity", Communications of the ACM, Vol. 46 No. 12, pp. 21-5.
    • (2003) Communications of the ACM , vol.46 , Issue.12 , pp. 21-25
    • Mercuri, R.1
  • 25
    • 1642318365 scopus 로고    scopus 로고
    • "Toward a new framework for information security"
    • in Bosworth, S. and Kabay, M.E. (Eds), Wiley, New York, NY
    • Parker, D. (2002), "Toward a new framework for information security", in Bosworth, S. and Kabay, M.E. (Eds), Computer Security Handbook, Wiley, New York, NY.
    • (2002) Computer Security Handbook
    • Parker, D.1
  • 26
    • 49249110281 scopus 로고    scopus 로고
    • "Establishing business controls for electronic mail communications"
    • Peltier, T. (2003), "Establishing business controls for electronic mail communications", Information Systems Security, Vol. 12, pp. 34-43.
    • (2003) Information Systems Security , vol.12 , pp. 34-43
    • Peltier, T.1
  • 27
    • 0042484572 scopus 로고    scopus 로고
    • "2002 CSI/FBI computer crime and security survey"
    • Power, R. (2002), "2002 CSI/FBI computer crime and security survey", Computer Security Issues &Trends, Vol. 8 No. 1, pp. 1-22.
    • (2002) Computer Security Issues &Trends , vol.8 , Issue.1 , pp. 1-22
    • Power, R.1
  • 29
    • 49249132931 scopus 로고    scopus 로고
    • "Intrusion detection technology: Leveraging the organization's security posture"
    • Rosenthal, D. (2002), "Intrusion detection technology: Leveraging the organization's security posture", Information Systems Management, Vol. 19 No. 1, pp. 35-44.
    • (2002) Information Systems Management , vol.19 , Issue.1 , pp. 35-44
    • Rosenthal, D.1
  • 31
    • 0033683516 scopus 로고    scopus 로고
    • "A conceptual foundation for organizational information security awareness"
    • Siponen, M. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 34
    • 0001133137 scopus 로고    scopus 로고
    • "Coping with systems risk: Security planning models for management decision making"
    • Straub, D. and Welke, R. (1998), "Coping with systems risk: security planning models for management decision making", MIS Quarterly, Vol. 22 No. 4, pp. 441-69.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.1    Welke, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.