메뉴 건너뛰기




Volumn 8, Issue 4, 2008, Pages

Security analysis of Internet technology components enabling globally distributed workplaces - A framework

Author keywords

Globally distributed workforce; Internet applications; Risk management; Security analysis

Indexed keywords

GLOBALLY DISTRIBUTED WORKFORCE; INTERNET APPLICATIONS; RISK MANAGEMENT; SECURITY ANALYSIS;

EID: 53949123562     PISSN: 15335399     EISSN: 15576051     Source Type: Journal    
DOI: 10.1145/1391949.1391951     Document Type: Article
Times cited : (19)

References (43)
  • 2
    • 0002785683 scopus 로고
    • A systematic approach toward assessing the value of an information system
    • AHITUV, N. 1980. A systematic approach toward assessing the value of an information system. MIS Q. 4, 61-75.
    • (1980) MIS Q , vol.4 , pp. 61-75
    • AHITUV, N.1
  • 4
    • 84900071554 scopus 로고    scopus 로고
    • Analyzing risks to determine a new return on security investment
    • H.R. Rao et al. eds, Idea Group, Hershey, PA
    • AXELROD, W. 2007. Analyzing risks to determine a new return on security investment. Managing Information Assurance in Financial Services, H.R. Rao et al. eds., Idea Group, Hershey, PA, 6-36.
    • (2007) Managing Information Assurance in Financial Services , pp. 6-36
    • AXELROD, W.1
  • 6
    • 0000050762 scopus 로고    scopus 로고
    • The implications of information technology infrastructure for business process redesign
    • BROADBENT, M., WEILL, P., AND CLAIR, D. S. 1999. The implications of information technology infrastructure for business process redesign. MIS Q. 23, 159-182.
    • (1999) MIS Q , vol.23 , pp. 159-182
    • BROADBENT, M.1    WEILL, P.2    CLAIR, D.S.3
  • 7
    • 0032050835 scopus 로고    scopus 로고
    • Risk assessment: Subjective or objective?
    • AMPBELL, H. 1998. Risk assessment: Subjective or objective? Eng. Sei. Edu. J. 7, 57-63.
    • (1998) Eng. Sei. Edu. J , vol.7 , pp. 57-63
    • AMPBELL, H.1
  • 10
    • 53949118021 scopus 로고    scopus 로고
    • EARL, M. J. 2002. The risks of outsourcing IT. Sloan Manag. Rev. 37, 26-32.
    • EARL, M. J. 2002. The risks of outsourcing IT. Sloan Manag. Rev. 37, 26-32.
  • 11
    • 0012219319 scopus 로고    scopus 로고
    • Delivering enterprise resource planning systems through ASPs
    • EKANAYAKA, Y., CURRIE, W., AND SELTSIKAS, P. 2002. Delivering enterprise resource planning systems through ASPs. J. Logistics Inf. Manag. 15, 192-203.
    • (2002) J. Logistics Inf. Manag , vol.15 , pp. 192-203
    • EKANAYAKA, Y.1    CURRIE, W.2    SELTSIKAS, P.3
  • 13
    • 0036041635 scopus 로고    scopus 로고
    • Distributed component technologies and their software engineering implications
    • Orlando, FL, ACM
    • EMMERICH, W 2002. Distributed component technologies and their software engineering implications. In Proceedings of the International Conference on Software Engineering, Orlando, FL, ACM, 537-546.
    • (2002) Proceedings of the International Conference on Software Engineering , pp. 537-546
    • EMMERICH, W.1
  • 19
    • 0035400468 scopus 로고    scopus 로고
    • Architecture based approach to reliability assessment of software systems
    • GOSEVA-POPSTOJANOVA, K. AND TRIVEDI, K. S. 2001. Architecture based approach to reliability assessment of software systems. Perform. Eval. 45.
    • (2001) Perform. Eval , vol.45
    • GOSEVA-POPSTOJANOVA, K.1    TRIVEDI, K.S.2
  • 20
    • 2642572419 scopus 로고    scopus 로고
    • Electronic banking and information assurance issues: Survey and synthesis
    • GUPTA, M., RAO, H. R., AND UPADHYAYA, S. 2004. Electronic banking and information assurance issues: Survey and synthesis. J. Organiz. End User Comput. 16, 1-21.
    • (2004) J. Organiz. End User Comput , vol.16 , pp. 1-21
    • GUPTA, M.1    RAO, H.R.2    UPADHYAYA, S.3
  • 22
    • 33751161222 scopus 로고    scopus 로고
    • ACM SIGMIS Database 36
    • M, G. P. AND BASKERVILLE, R. L. 2005. A longitudinal study of information system threat categories: The enduring problem of human error. ACM SIGMIS Database 36, 68-79.
    • (2005) , pp. 68-79
    • IM, G.P.1    BASKERVILLE, R.L.2
  • 23
    • 53949105074 scopus 로고    scopus 로고
    • NTERNATIONAL SECURITY TECHNOLOGY IST INC
    • NTERNATIONAL SECURITY TECHNOLOGY (IST INC) 2000. Managing risks using CORA.
    • (2000) Managing risks using CORA
  • 24
    • 0033265783 scopus 로고    scopus 로고
    • Communication and trust in global virtual teams
    • JARVENPAA, S. AND LEIDNER, D. Communication and trust in global virtual teams. Organiz. Sci. 10, 791-815.
    • Organiz. Sci , vol.10 , pp. 791-815
    • JARVENPAA, S.1    LEIDNER, D.2
  • 25
    • 17844381878 scopus 로고    scopus 로고
    • KARABACAK, B. AND SOGUKPINAR, I. ISRAM: Information security risk analysis method. Comput. Secur. 24, 147-159.
    • KARABACAK, B. AND SOGUKPINAR, I. ISRAM: Information security risk analysis method. Comput. Secur. 24, 147-159.
  • 28
    • 84900239367 scopus 로고    scopus 로고
    • Security risk management strategy of financial services institutions
    • H. R. Rao et al. eds. Idea Group, Hershey, PA
    • AO, G. AND WANG, L. 2007. Security risk management strategy of financial services institutions. Managing Information Assurance in Financial Services, In H. R. Rao et al. eds. Idea Group, Hershey, PA.
    • (2007) Managing Information Assurance in Financial Services
    • AO, G.1    WANG, L.2
  • 34
    • 84892306926 scopus 로고    scopus 로고
    • Business process offshoring to India: An overview
    • A. Heinzl et al. eds
    • SAHAJPAL, G., AGRAWAL, M., KISHORE, R., AND RAO, H. R. 2006. Business process offshoring to India: An overview. Outsourcing, In A. Heinzl et al. eds.
    • (2006) Outsourcing
    • SAHAJPAL, G.1    AGRAWAL, M.2    KISHORE, R.3    RAO, H.R.4
  • 35
    • 84857316120 scopus 로고    scopus 로고
    • The use of information systems in collocated and distributed teams: A test of the 24-hour knowledge factory
    • SSRN
    • SESHASAI, S., MALTER, A. J., AND GUPTA, A. 2006. The use of information systems in collocated and distributed teams: A test of the 24-hour knowledge factory. In Proceedings of the SSRN eLibrary, SSRN.
    • (2006) Proceedings of the SSRN eLibrary
    • SESHASAI, S.1    MALTER, A.J.2    GUPTA, A.3
  • 36
    • 33749038912 scopus 로고    scopus 로고
    • SHARMA, V. S. AND TRIVEDI, K. S. 2005. Architecture based analysis of performance, reliability and security of software systems, In Proceedings of the 5th ACM International Workshop on Software and Performance (WOSP), Palma de Mallorca, Spain.
    • SHARMA, V. S. AND TRIVEDI, K. S. 2005. Architecture based analysis of performance, reliability and security of software systems, In Proceedings of the 5th ACM International Workshop on Software and Performance (WOSP), Palma de Mallorca, Spain.
  • 38
    • 0002180672 scopus 로고    scopus 로고
    • Reconceptualizing the determinants of risk behavior
    • SITKLN, S. B. AND PABLO, A. L. Reconceptualizing the determinants of risk behavior. Academ. Manag. Rev. 17, 9-38.
    • Academ. Manag. Rev , vol.17 , pp. 9-38
    • SITKLN, S.B.1    PABLO, A.L.2
  • 41
    • 25444498268 scopus 로고    scopus 로고
    • Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis
    • TANNA, G., GUPTA, M., RAO, H. R., AND UPADHYAYA, S. 2005. Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis. Decision Support Syst. 41, 242-261.
    • (2005) Decision Support Syst , vol.41 , pp. 242-261
    • TANNA, G.1    GUPTA, M.2    RAO, H.R.3    UPADHYAYA, S.4
  • 43
    • 0032025414 scopus 로고    scopus 로고
    • Scenarios in system development: Current practice
    • WEIDENHAUPT, K., POHL, K., JARKE, M., AND HAUMER, P. 1998. Scenarios in system development: Current practice. IEEE Softw. 34-45.
    • (1998) IEEE Softw , pp. 34-45
    • WEIDENHAUPT, K.1    POHL, K.2    JARKE, M.3    HAUMER, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.