메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Exploring the suitability of IS security management standards for SMEs

Author keywords

[No Author keywords available]

Indexed keywords

IS SECURITY MANAGEMENT; ISO 9000 STANDARD; LITERATURE REVIEWS; SECURITY STANDARDS;

EID: 51449119466     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2008.167     Document Type: Conference Paper
Times cited : (50)

References (70)
  • 3
    • 84986166563 scopus 로고    scopus 로고
    • ISO 9000 and performance of small tourism enterprises: A focus on Westons Cider Company
    • Augustyn M. M., and Pheby J.D., (2000), "ISO 9000 and performance of small tourism enterprises: a focus on Westons Cider Company", Managing service quality, Vol. 10 (6), 2000, pp. 374-388.
    • (2000) Managing service quality , vol.10 , Issue.6 , pp. 374-388
    • Augustyn, M.M.1    Pheby, J.D.2
  • 5
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993), "Information systems security design methods: implications for information systems development", ACM Computing Surveys, Vol. 25 No.4, pp.375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 6
    • 51449098443 scopus 로고    scopus 로고
    • ISO 27001: Risk management and compliance
    • Brenner J., (2007), "ISO 27001: Risk management and compliance", Risk Management Magazine, Vol. 54 (1), pp. 24-29;
    • (2007) Risk Management Magazine , vol.54 , Issue.1 , pp. 24-29
    • Brenner, J.1
  • 8
    • 0012670699 scopus 로고    scopus 로고
    • Center for Research on Information Technology and Organizations CRITO, University of California, Irvine
    • Brousseau, E., (2002), "Globalization and E-commerce: The French Environment and Policy", Center for Research on Information Technology and Organizations (CRITO), University of California, Irvine. http://www.crito.uci. edu/publications/pdf/GEC2_France.pdf
    • (2002) Globalization and E-commerce: The French Environment and Policy
    • Brousseau, E.1
  • 10
    • 8444230478 scopus 로고    scopus 로고
    • Chapman D., Smalov L., (2004), On information security guidelines for small/medium enterprises, ICEIS 2004 - Information analysis and specification, 2004, pp. 3-9.
    • Chapman D., Smalov L., (2004), "On information security guidelines for small/medium enterprises", ICEIS 2004 - Information analysis and specification, 2004, pp. 3-9.
  • 11
    • 51449124119 scopus 로고    scopus 로고
    • CERT, (2007), CERT/CC: Statistics 1988-2007, Computer Emergency Response Team, www.cert.org, USA;
    • CERT, (2007), "CERT/CC: Statistics 1988-2007", Computer Emergency Response Team, www.cert.org, USA;
  • 13
    • 51449104593 scopus 로고    scopus 로고
    • CLUSIF, (2004; 2006), Politiques de sécurité des systèmes d'information et sinistralité en France, Club de la sécurité des informations français (French information systems security club), Paris.
    • CLUSIF, (2004; 2006), "Politiques de sécurité des systèmes d'information et sinistralité en France", Club de la sécurité des informations français (French information systems security club), Paris.
  • 14
    • 51449099260 scopus 로고    scopus 로고
    • La certification des critères communs: Le point de vue du developpeur
    • CNRS
    • CNRS, (2002), "La certification des critères communs: le point de vue du developpeur", Securité informatique, No 42, pp. 5-6.
    • (2002) Securité informatique , Issue.42 , pp. 5-6
  • 15
    • 51449106369 scopus 로고
    • BS 5750 - a logical step
    • Conway T., (1994), "BS 5750 - a logical step", The TQM magazine, Vol. 6 (5), pp. 38-40.
    • (1994) The TQM magazine , vol.6 , Issue.5 , pp. 38-40
    • Conway, T.1
  • 17
    • 20144378762 scopus 로고    scopus 로고
    • The coming commoditization of processes
    • June, pp
    • Davenport, T. H., (2005), "The coming commoditization of processes," Harvard Business Review (June), pp. 100-108.
    • (2005) Harvard Business Review , pp. 100-108
    • Davenport, T.H.1
  • 18
    • 0036398120 scopus 로고    scopus 로고
    • Policy enforcement in the workplace
    • David J., (2002), "Policy enforcement in the workplace", Computers & Security, Vol. 21 (6), pp. 506-513;
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 506-513
    • David, J.1
  • 19
    • 0002681615 scopus 로고
    • Determinants of success for computer usage in small businesses
    • DeLone W.H., (1988), "Determinants of success for computer usage in small businesses", MIS Quarterly, Vol. 5 (4), pp. 51-61;
    • (1988) MIS Quarterly , vol.5 , Issue.4 , pp. 51-61
    • DeLone, W.H.1
  • 20
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon G., Backhouse J., (2001), "Current directions in IS security research: towards socio-organizational perspectives", Information Systems Journal, 11, pp. 127-153;
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 21
    • 25144436981 scopus 로고    scopus 로고
    • Do information security policies reduce the incidence of security breaches: An exploratory analysis
    • Oct-Dec, pp
    • Doherty N.F., Fulford H., (2005), "Do information security policies reduce the incidence of security breaches: an exploratory analysis", Information resources management journal; 18 (4), Oct-Dec, pp. 21-39;
    • (2005) Information resources management journal , vol.18 , Issue.4 , pp. 21-39
    • Doherty, N.F.1    Fulford, H.2
  • 22
    • 32444443168 scopus 로고    scopus 로고
    • Aligning the information security policy with the strategic information systems plan
    • Doherty N.F., Fulford H., (2006), "Aligning the information security policy with the strategic information systems plan", Computers & Security; 25, pp. 55-63;
    • (2006) Computers & Security , vol.25 , pp. 55-63
    • Doherty, N.F.1    Fulford, H.2
  • 26
    • 33644541231 scopus 로고    scopus 로고
    • A new forecasting model for the diffusion of ISO 9000 standards certifications in European countries
    • Franceschini F., Galetto M., Gianni G., (2004), "A new forecasting model for the diffusion of ISO 9000 standards certifications in European countries", International journal of Quality & reliability management, Vol. 21 (1), pp. 32-50.
    • (2004) International journal of Quality & reliability management , vol.21 , Issue.1 , pp. 32-50
    • Franceschini, F.1    Galetto, M.2    Gianni, G.3
  • 27
    • 33746253089 scopus 로고    scopus 로고
    • A worldwide analysis of ISO 9000 standard diffusion: Considerations and future development
    • Franceschini F., Galetto M., Cecconi P., (2006), "A worldwide analysis of ISO 9000 standard diffusion: Considerations and future development", Benchmarking: An international journal, Vol. 13 (4), pp. 523-541.
    • (2006) Benchmarking: An international journal , vol.13 , Issue.4 , pp. 523-541
    • Franceschini, F.1    Galetto, M.2    Cecconi, P.3
  • 28
    • 0003108458 scopus 로고
    • consultant engagement for first time computerization: A proactive client role in small businesses
    • Gable G.G., (1991), "consultant engagement for first time computerization: A proactive client role in small businesses", Information & Management, Vol. 20, pp. 83-93;
    • (1991) Information & Management , vol.20 , pp. 83-93
    • Gable, G.G.1
  • 29
    • 24144453387 scopus 로고    scopus 로고
    • Information systems security issues and decisions for small businesses: An empirical examination
    • Gupta A., Hammond R., (2005), "Information systems security issues and decisions for small businesses: an empirical examination", Information Management and Computer Security, Vol. 13 No 4, pp. 297-310;
    • (2005) Information Management and Computer Security , vol.13 , Issue.4 , pp. 297-310
    • Gupta, A.1    Hammond, R.2
  • 30
    • 0036613095 scopus 로고    scopus 로고
    • What makes an effective information security policy
    • Hone K., Eloff J.H.P., (2002a), "What makes an effective information security policy", Network Security, Vol. 20 (6), pp. 14-16;
    • (2002) Network Security , vol.20 , Issue.6 , pp. 14-16
    • Hone, K.1    Eloff, J.H.P.2
  • 31
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy: What do international security standards say
    • Hone K., Eloff J.H.P., (2002b), "Information security policy: what do international security standards say", Computers & Security, Vol. 21 (5), pp. 402-409;
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 402-409
    • Hone, K.1    Eloff, J.H.P.2
  • 33
    • 51449090797 scopus 로고    scopus 로고
    • ISMS User Group
    • ISMS User Group, (2007), http://www.iso27001certificates.com/.
    • (2007)
  • 35
    • 51449110433 scopus 로고    scopus 로고
    • The ISO survey of ISO 9001:2000 and ISO 14001 Certificates
    • ISO, Geneva
    • ISO, (2002), "The ISO survey of ISO 9001:2000 and ISO 14001 Certificates", Twelfth cycle, Geneva.
    • (2002) Twelfth cycle
  • 36
    • 51449092069 scopus 로고    scopus 로고
    • ISO (2003, 2004, 2005), The ISO survey of ISO 9001:2000 and ISO 14001 Certificates, Geneva.
    • ISO (2003, 2004, 2005), "The ISO survey of ISO 9001:2000 and ISO 14001 Certificates", Geneva.
  • 38
    • 0002633623 scopus 로고    scopus 로고
    • The U.S. National Information Infrastructure Initiative: The Market, the Net, and the Virtual Project
    • Kahin, B. and Wilson, E, Eds, MIT Press, Cambridge, Mass
    • Kahin, B. (1997), "The U.S. National Information Infrastructure Initiative: The Market, the Net, and the Virtual Project", in Kahin, B. and Wilson, E. (Eds), National Information Infrastructure Initiatives: Vision and Policy Design, MIT Press, Cambridge, Mass.
    • (1997) National Information Infrastructure Initiatives: Vision and Policy Design
    • Kahin, B.1
  • 40
    • 0029727921 scopus 로고    scopus 로고
    • In praise of ISO 9000
    • Mc Lachlan V.N., (1996), "In praise of ISO 9000", The TQM magazine, Vol. 8 (3), pp. 21-23.
    • (1996) The TQM magazine , vol.8 , Issue.3 , pp. 21-23
    • Mc Lachlan, V.N.1
  • 41
    • 84986133689 scopus 로고    scopus 로고
    • Corporate information security management
    • MCB University press;
    • Mitchell R.C., Marcella R., Baxter G., (1999), "Corporate information security management", New Library World, Vol. 100, no 1150, pp. 213-227, MCB University press;
    • (1999) New Library World , vol.100 , Issue.1150 , pp. 213-227
    • Mitchell, R.C.1    Marcella, R.2    Baxter, G.3
  • 42
    • 84870590661 scopus 로고    scopus 로고
    • Le dirigeant confronté à la décision d'investissement en T.I.C.
    • l'Harmattan, Paris;
    • Monnoyer M.C., (2003), Le dirigeant confronté à la décision d'investissement en T.I.C., in Boutary, TIC et PME: des usages aux stratégies, l'Harmattan, Paris;
    • (2003) Boutary, TIC et PME: Des usages aux stratégies
    • Monnoyer, M.C.1
  • 43
    • 0002495427 scopus 로고
    • Policies, procedures and standards: An approach for implementation
    • Moule B., Giavara L., (1995), "Policies, procedures and standards: an approach for implementation", Information Management & Computer Security, Vol. 3 (3), pp. 7-16;
    • (1995) Information Management & Computer Security , vol.3 , Issue.3 , pp. 7-16
    • Moule, B.1    Giavara, L.2
  • 44
    • 0036833109 scopus 로고    scopus 로고
    • The stock market's reaction to quality certification: Empirical evidence from Spain
    • Nicolau J.L., Sellers R., (2002), "The stock market's reaction to quality certification: empirical evidence from Spain", European journal of operations research, Vol. 142, pp. 632-41;
    • (2002) European journal of operations research , vol.142 , pp. 632-641
    • Nicolau, J.L.1    Sellers, R.2
  • 45
    • 84977302505 scopus 로고
    • The facts about small business and the real values of its 'life world'
    • July
    • Noteboom B., (1988), "The facts about small business and the real values of its 'life world'", American journal of economics and sociology (47:3), July 1988, pp. 299-314;
    • (1988) American journal of economics and sociology , vol.47 , Issue.3 , pp. 299-314
    • Noteboom, B.1
  • 47
    • 0033745439 scopus 로고    scopus 로고
    • Implementing information security in the 21st century - Do you have the balancing factors?
    • Nosworthy J.D., (2000), "Implementing information security in the 21st century - Do you have the balancing factors?", Computers and security, Vol. 19 (4), pp. 337-347;
    • (2000) Computers and security , vol.19 , Issue.4 , pp. 337-347
    • Nosworthy, J.D.1
  • 48
    • 0003724905 scopus 로고
    • Information Systems Security: Scope, State-of-the-art, and Evaluation of Techniques
    • 47b
    • Pernul G., (1995), "Information Systems Security: Scope, State-of-the-art, and Evaluation of Techniques", International journal of information management, Vol. 15 (3), pp. 165-180; [47b]
    • (1995) International journal of information management , vol.15 , Issue.3 , pp. 165-180
    • Pernul, G.1
  • 50
    • 1142273446 scopus 로고    scopus 로고
    • PFIRES: A policy framework for information security
    • Rees J., Bandyopadhyay S., Spafford E.H., (2003), "PFIRES: A policy framework for information security", Communications of the ACM, Vol. 46 (7), pp. 101-106;
    • (2003) Communications of the ACM , vol.46 , Issue.7 , pp. 101-106
    • Rees, J.1    Bandyopadhyay, S.2    Spafford, E.H.3
  • 51
    • 33645700786 scopus 로고    scopus 로고
    • An analysis of the degree of small companies' dissatisfaction with ISO 9000 certification
    • Rodriguez-Escobar J.A., Gonzalez-Benito J., Martinez-Lorente A.R., (2006), "An analysis of the degree of small companies' dissatisfaction with ISO 9000 certification", Total quality management, Vol. 17 (4), pp. 507-521.
    • (2006) Total quality management , vol.17 , Issue.4 , pp. 507-521
    • Rodriguez-Escobar, J.A.1    Gonzalez-Benito, J.2    Martinez-Lorente, A.R.3
  • 52
    • 33747019602 scopus 로고    scopus 로고
    • Information security culture: From analysis to change
    • Schlienger T., Teufel S., (2003), "Information security culture: from analysis to change", South African Computer Journal, Vol. 31, pp. 46-52;
    • (2003) South African Computer Journal , vol.31 , pp. 46-52
    • Schlienger, T.1    Teufel, S.2
  • 55
    • 33747194078 scopus 로고    scopus 로고
    • Information security standards focus on the existence of process, not its content
    • Siponen M.T., (2006), "Information security standards focus on the existence of process, not its content", Communications of the ACM, Vol. 49 (8), pp. 97-100;
    • (2006) Communications of the ACM , vol.49 , Issue.8 , pp. 97-100
    • Siponen, M.T.1
  • 57
    • 0003317303 scopus 로고
    • Impact of consultants on computerization success in small businesses
    • Soh C.P.P., Yap C.S., Raman K.S., (1992), "Impact of consultants on computerization success in small businesses", Information and Management, Vol. 22, pp. 309-319;
    • (1992) Information and Management , vol.22 , pp. 309-319
    • Soh, C.P.P.1    Yap, C.S.2    Raman, K.S.3
  • 58
    • 0003168891 scopus 로고    scopus 로고
    • Security requirements, risks and recommendations for small enterprise and home-office environments
    • Spinellis D., Kokolakis S., Gritzalis S., (1999), "Security requirements, risks and recommendations for small enterprise and home-office environments", Information Management and Computer Security, Vol.7 No 3, pp. 121-128;
    • (1999) Information Management and Computer Security , vol.7 , Issue.3 , pp. 121-128
    • Spinellis, D.1    Kokolakis, S.2    Gritzalis, S.3
  • 59
    • 0642333244 scopus 로고    scopus 로고
    • Does ISO 9000 have an effect on quality management practices? An international empirical study
    • Subba R., Ragu-Nathan T.S., Solis L.E., (1997), "Does ISO 9000 have an effect on quality management practices? An international empirical study", Total quality management, Vol. 8 (6), pp. 335-346.
    • (1997) Total quality management , vol.8 , Issue.6 , pp. 335-346
    • Subba, R.1    Ragu-Nathan, T.S.2    Solis, L.E.3
  • 60
    • 0030488640 scopus 로고    scopus 로고
    • Top management support, external expertise and information systems implementation in small businesses
    • Thong J.Y.L, Yap C.S., Raman K.S., (1996), "Top management support, external expertise and information systems implementation in small businesses", Information systems research, Vol.7, No 2, pp 248-267;
    • (1996) Information systems research , vol.7 , Issue.2 , pp. 248-267
    • Thong, J.Y.L.1    Yap, C.S.2    Raman, K.S.3
  • 61
    • 51449119905 scopus 로고    scopus 로고
    • SMEs and the evolution of the European information society: Policy themes and initiatives
    • London; pp
    • Turner C., (1997), "SMEs and the evolution of the European information society: policy themes and initiatives", European Business Journal, Vol. 9, No 4, London; pp. 47-52;
    • (1997) European Business Journal , vol.9 , Issue.4 , pp. 47-52
    • Turner, C.1
  • 62
    • 0033657872 scopus 로고    scopus 로고
    • information security- The third wave?
    • Von Solms B., (2000), "information security- The third wave?", Computers & Security, Vol. 19 (7), pp. 615-620;
    • (2000) Computers & Security , vol.19 , Issue.7 , pp. 615-620
    • Von Solms, B.1
  • 63
    • 51449103251 scopus 로고    scopus 로고
    • Von Solms R., Van de Haar, (2000), From Trusted Information Security Controls to a Trusted Information Security Environment, proceeding of the 16th Annual Working Conference on Information Security, IFIP, August, Beijing, Chine, contribution no 4/52;
    • Von Solms R., Van de Haar, (2000), "From Trusted Information Security Controls to a Trusted Information Security Environment", proceeding of the 16th Annual Working Conference on Information Security, IFIP, August, Beijing, Chine, contribution no 4/52;
  • 65
    • 19944396489 scopus 로고    scopus 로고
    • From information security to ... business security
    • Von Solms B., Von Solms R., (2005), "From information security to ... business security", Computers & Security, Vol. 24, pp. 271-273;
    • (2005) Computers & Security , vol.24 , pp. 271-273
    • Von Solms, B.1    Von Solms, R.2
  • 66
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • Vroom C., Von Solms R., (2004), "Towards information security behavioural compliance", Computers & Security, Vol.23, pp. 191-198;
    • (2004) Computers & Security , vol.23 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 67
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the Past to Prepare for the Future: Writing a Literature Review
    • Webster, J., & Watson, R. T. (2002). "Analyzing the Past to Prepare for the Future: Writing a Literature Review", MIS Quarterly, 26(2), xiii-xxiii.
    • (2002) MIS Quarterly , vol.26 , Issue.2
    • Webster, J.1    Watson, R.T.2
  • 69
    • 18844458431 scopus 로고    scopus 로고
    • An unappreciated reason why information security policies fail
    • Wood CC., (2000), "An unappreciated reason why information security policies fail", Computer fraud & Security, Vol. 2000 (10), pp. 13-14;
    • (2000) Computer fraud & Security , vol.2000 , Issue.10 , pp. 13-14
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.