메뉴 건너뛰기




Volumn 36, Issue 3 PART 1, 2009, Pages 5582-5591

Using case-based reasoning for the design of controls for internet-based information systems

Author keywords

Case based reasoning (CBR); Controls; Internet based information systems (IIS); Recommendation of controls; Security

Indexed keywords

CONTROL ENGINEERING; DISCRIMINANT ANALYSIS; INFORMATION SYSTEMS; INFORMATION USE; MULTIVARIANT ANALYSIS;

EID: 58349117665     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2008.06.081     Document Type: Article
Times cited : (10)

References (43)
  • 1
    • 58349083820 scopus 로고    scopus 로고
    • Althoff, K. D., Auriol, E., Bergmann, R., Breen, S., Dittrich, S., & Johnston, R., et al. (1995). Case-based reasoning for decision support and diagnostic problem solving: The INRECA approach. In B. Bartsch-Sp rl, D. Janetzko & S. Wess (Eds.), Proceedings of the 3rd German workshop on CBR, LSA-Report 95-02, Centre for Learning and Applications, University of Kaiserlautern (pp. 63-72).
    • Althoff, K. D., Auriol, E., Bergmann, R., Breen, S., Dittrich, S., & Johnston, R., et al. (1995). Case-based reasoning for decision support and diagnostic problem solving: The INRECA approach. In B. Bartsch-Sp rl, D. Janetzko & S. Wess (Eds.), Proceedings of the 3rd German workshop on CBR, LSA-Report 95-02, Centre for Learning and Applications, University of Kaiserlautern (pp. 63-72).
  • 2
    • 58349103433 scopus 로고    scopus 로고
    • Chan, S., Govindan, M., Picard, J. Y., Leschiutta, E. (1993). EDI for Managers and Auditors, Electronic Data Interchange Council of Canada.
    • Chan, S., Govindan, M., Picard, J. Y., Leschiutta, E. (1993). EDI for Managers and Auditors, Electronic Data Interchange Council of Canada.
  • 3
    • 33750447991 scopus 로고    scopus 로고
    • A hybrid system by evolving case-based reasoning with genetic algorithm in wholesaler's returning book forecasting
    • Chang P.C., Lai C.Y., and Lai K.R. A hybrid system by evolving case-based reasoning with genetic algorithm in wholesaler's returning book forecasting. Decision Support Systems 42 3 (2006) 1715-1729
    • (2006) Decision Support Systems , vol.42 , Issue.3 , pp. 1715-1729
    • Chang, P.C.1    Lai, C.Y.2    Lai, K.R.3
  • 4
    • 0141749138 scopus 로고    scopus 로고
    • Portfolios of control in outsourced software development projects
    • Choudhury V., and Sabherwal R. Portfolios of control in outsourced software development projects. Information Systems Research 14 3 (2003) 291-314
    • (2003) Information Systems Research , vol.14 , Issue.3 , pp. 291-314
    • Choudhury, V.1    Sabherwal, R.2
  • 5
    • 32544441740 scopus 로고    scopus 로고
    • Fighting cybercrime: A review and the Taiwan experience
    • Chung W., Chen H., Chang W., and Chou S. Fighting cybercrime: A review and the Taiwan experience. Decision Support Systems 41 3 (2006) 669-682
    • (2006) Decision Support Systems , vol.41 , Issue.3 , pp. 669-682
    • Chung, W.1    Chen, H.2    Chang, W.3    Chou, S.4
  • 6
    • 58349085026 scopus 로고    scopus 로고
    • Computer Security Institute (2006). CSI/FBI computer crime and security survey.
    • Computer Security Institute (2006). CSI/FBI computer crime and security survey.
  • 7
    • 33845945922 scopus 로고
    • Coefficient alpha and the internal structure of tests
    • (September)
    • Cronbach L.J. Coefficient alpha and the internal structure of tests. Psychometrica 16 3 (1951) 297-334 (September)
    • (1951) Psychometrica , vol.16 , Issue.3 , pp. 297-334
    • Cronbach, L.J.1
  • 8
    • 0042367634 scopus 로고    scopus 로고
    • Mining e-mail content for author identification forensics
    • de Vel O., Anderson A., Corney M., and Mohay G. Mining e-mail content for author identification forensics. SIGMOD Record 30 4 (2001) 55-64
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 55-64
    • de Vel, O.1    Anderson, A.2    Corney, M.3    Mohay, G.4
  • 13
    • 32544451794 scopus 로고    scopus 로고
    • Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
    • Gupta M., Rees J., Chaturvedi A., and Chi J. Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach. Decision Support Systems 41 (2006) 592-603
    • (2006) Decision Support Systems , vol.41 , pp. 592-603
    • Gupta, M.1    Rees, J.2    Chaturvedi, A.3    Chi, J.4
  • 15
    • 34547798962 scopus 로고    scopus 로고
    • Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
    • Hansen J.V., Lowry P.B., Meservy R.D., and McDonald D.M. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems 43 (2007) 1362-1374
    • (2007) Decision Support Systems , vol.43 , pp. 1362-1374
    • Hansen, J.V.1    Lowry, P.B.2    Meservy, R.D.3    McDonald, D.M.4
  • 16
    • 58349118652 scopus 로고    scopus 로고
    • ISACF (Information Systems Audit and Control Foundation) (1992). Control objectives, controls in an information systems environments: Controls guidelines and audit procedures (4th ed.). Rolling Meadows, IL, USA.
    • ISACF (Information Systems Audit and Control Foundation) (1992). Control objectives, controls in an information systems environments: Controls guidelines and audit procedures (4th ed.). Rolling Meadows, IL, USA.
  • 18
    • 21144465094 scopus 로고
    • Control combinations in marketing: Conceptual framework and empirical evidence
    • Jaworski J.B., Stathakopoulos V., and Krishnan H.S. Control combinations in marketing: Conceptual framework and empirical evidence. Journal of Marketing 57 January (1993) 57-69
    • (1993) Journal of Marketing , vol.57 , Issue.January , pp. 57-69
    • Jaworski, J.B.1    Stathakopoulos, V.2    Krishnan, H.S.3
  • 19
    • 13244253851 scopus 로고    scopus 로고
    • Deploying common systems globally: The dynamics of control
    • Kirsch L.J. Deploying common systems globally: The dynamics of control. Information Systems Research 15 4 (2004) 374-395
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 374-395
    • Kirsch, L.J.1
  • 20
    • 0026173429 scopus 로고
    • Improving human decision making through case-based decision aiding
    • Kolodner J.L. Improving human decision making through case-based decision aiding. AI Magazine 12 2 (1991) 52-68
    • (1991) AI Magazine , vol.12 , Issue.2 , pp. 52-68
    • Kolodner, J.L.1
  • 24
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee S.M., Lee S.G., and Yoo S. An integrative model of computer abuse based on social control and general deterrence theories. Information & Management 41 (2004) 707-718
    • (2004) Information & Management , vol.41 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 25
    • 58349095090 scopus 로고    scopus 로고
    • Lee, W., & Stolfo, S. J. (2000). Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX security symposium, advanced computing systems association (pp. 66-72).
    • Lee, W., & Stolfo, S. J. (2000). Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX security symposium, advanced computing systems association (pp. 66-72).
  • 28
    • 0013279426 scopus 로고
    • Case-based reasoning: Market applications and fit with other technologies
    • Mott S. Case-based reasoning: Market applications and fit with other technologies. Expert Systems With Applications 6 1 (1993) 97-104
    • (1993) Expert Systems With Applications , vol.6 , Issue.1 , pp. 97-104
    • Mott, S.1
  • 30
    • 1242310120 scopus 로고    scopus 로고
    • The matrix of control: Combining process and structure approaches to managing software development
    • Nidumolu S.R., and Subramni M.R. The matrix of control: Combining process and structure approaches to managing software development. Journal of Management Information Systems 20 3 (2003) 159-196
    • (2003) Journal of Management Information Systems , vol.20 , Issue.3 , pp. 159-196
    • Nidumolu, S.R.1    Subramni, M.R.2
  • 33
    • 9144274460 scopus 로고    scopus 로고
    • Trust and the unintended effects of behavior control in virtual teams
    • Piccoli G., and Ives B. Trust and the unintended effects of behavior control in virtual teams. MIS Quarterly 27 3 (2003) 365-395
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 365-395
    • Piccoli, G.1    Ives, B.2
  • 39
    • 0036004583 scopus 로고    scopus 로고
    • An empirical examination of the concern for information privacy instrument
    • Stewart K.A., and Segars A.H. An empirical examination of the concern for information privacy instrument. Information Systems Research 13 1 (2002) 36-49
    • (2002) Information Systems Research , vol.13 , Issue.1 , pp. 36-49
    • Stewart, K.A.1    Segars, A.H.2
  • 40
    • 67649967226 scopus 로고    scopus 로고
    • The impact of customer trust and perception of security control on the acceptance of electronic commerce
    • Suh B., and Han I. The impact of customer trust and perception of security control on the acceptance of electronic commerce. International Journal of Electronic Commerce 7 3 (2003) 135-161
    • (2003) International Journal of Electronic Commerce , vol.7 , Issue.3 , pp. 135-161
    • Suh, B.1    Han, I.2
  • 41
    • 1942521938 scopus 로고    scopus 로고
    • Taxonomy of security considerations and software quality
    • Wang H., and Wang C. Taxonomy of security considerations and software quality. Communications of the ACM 46 6 (2003) 75-78
    • (2003) Communications of the ACM , vol.46 , Issue.6 , pp. 75-78
    • Wang, H.1    Wang, C.2
  • 43
    • 1242265154 scopus 로고    scopus 로고
    • In defense of the realm: Understanding the threats to information security
    • Whitman M.E. In defense of the realm: Understanding the threats to information security. International Journal of Information Management 24 4 (2004) 3-57
    • (2004) International Journal of Information Management , vol.24 , Issue.4 , pp. 3-57
    • Whitman, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.