메뉴 건너뛰기




Volumn , Issue , 2007, Pages 622-631

Positive and negative findings of the ISO/IEC 17799 framework

Author keywords

Information security management; ISO IEC 17799 standard

Indexed keywords

COMPETITIVE ADVANTAGE; EMPIRICAL EVIDENCE; END-PRODUCTS; INDIRECT EFFECTS; INFORMATION SECURITY MANAGEMENTS; INFORMATION SECURITY PRACTICE; ISO/IEC; SEMI STRUCTURED INTERVIEWS; TECHNICAL ASPECTS;

EID: 67650117172     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (35)
  • 4
    • 84869146886 scopus 로고    scopus 로고
    • Deloitte, viewed 23.8.2006
    • Deloitte. 2005, Information security research, viewed 23.8.2006 http://www.deloitte.com/dtt/research/0,1015,sid=1013&cid=85452,00.html.
    • (2005) Information Security Research
  • 5
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon, G. & Backhouse, J. 2000, 'Information system security management in the new millennium' Communications of the ACM vol. 43, issue 7, pp. 125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 6
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G. & Backhouse, J. 2001, 'Current directions in IS security research: towards socio-organizational perspectives' Information Systems Journal vol. 11, issue 2, pp. 127-153.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 7
    • 26844516038 scopus 로고    scopus 로고
    • DTI, viewed 27.11.2006
    • DTI. 2005, The_Empirical_Economics_of_Standards viewed 27.11.2006 http://www.dti.gov.uk/files/file9655.pdf.
    • (2005) The_Empirical_Economics_of_Standards
  • 10
    • 33847149105 scopus 로고    scopus 로고
    • viewed 23.8.2006
    • Ernst & Young. 2005, Global Information Security survey 2005 viewed 23.8.2006 http://int.sitestat.com/ernst-and-young/international/s?Global-Information-Security-survey-2005&ns_type=pdf.
    • (2005) Global Information Security Survey 2005
    • Ernst1    Young2
  • 11
    • 15744404682 scopus 로고    scopus 로고
    • Management of risk in the information age
    • Gerber, M. & von Solms, R. 2005, 'Management of risk in the information age' Computers & Security vol. 24, pp. 16-30.
    • (2005) Computers & Security , vol.24 , pp. 16-30
    • Gerber, M.1    von Solms, R.2
  • 13
    • 69849093151 scopus 로고    scopus 로고
    • Homeland, USA viewed 24.8.2006
    • Homeland. 2006, The Department of Homeland Security, USA viewed 24.8.2006 http://www.dhs.gov/dhspublic/
    • (2006) The Department of Homeland Security
  • 14
    • 33751161222 scopus 로고    scopus 로고
    • A longitudinal study of information system threat categories: The enduring problem of human error
    • Im, G. P. & Baskerville, R. L. 2005, 'A longitudinal study of information system threat categories: the enduring problem of human error' ACM SIGMIS Database vol. 36, issue 4.
    • (2005) ACM SIGMIS Database , vol.36 , Issue.4
    • Im, G.P.1    Baskerville, R.L.2
  • 15
    • 84869136304 scopus 로고    scopus 로고
    • ISF, viewed 22.6.2006
    • ISF. 2006, Information Security Forum viewed 22.6.2006 http://www.securityforum.org/html/frameset.htm.
    • (2006) Information Security Forum
  • 16
    • 84869099002 scopus 로고    scopus 로고
    • Information Security Forum
    • ISFSTD, viewed 25.8
    • ISFSTD. 2006, Information Security Forum. The Standard of Good Practice for Information Security viewed 25.8. http://www.isfsecuritystandard.com/index_ns.htm.
    • (2006) The Standard of Good Practice For Information Security
  • 17
    • 84869143804 scopus 로고    scopus 로고
    • ISO/IEC 9000. 2000, viewed 16.9.2006
    • ISO/IEC 9000. 2000, ISO 9000-14000 standards viewed 16.9.2006 http://www.iso.org/iso/en/iso9000-14000/understand/selection_use/selection_use.html.
    • ISO 9000-14000 Standards
  • 19
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • Klein, H. K & Myers, M. D. 1999, 'A set of principles for conducting and evaluating interpretive field studies in information systems' MIS Quarterly vol. 23, issue 1, pp. 67-88.
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 67-88
    • Klein, H.K.1    Myers, M.D.2
  • 21
    • 22544463689 scopus 로고    scopus 로고
    • The implications of Sarbanes-Oxley for non-US IT departments
    • O'Conor, M. 2005, 'The implications of Sarbanes-Oxley for non-US IT departments' Network Security vol. 2005, issue 7, pp. 17-20.
    • (2005) Network Security , vol.2005 , Issue.7 , pp. 17-20
    • O'Conor, M.1
  • 22
    • 33644654726 scopus 로고    scopus 로고
    • Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II)
    • Pinder, P. 2006, 'Preparing Information Security for legal and regulatory compliance (Sarbanes-Oxley and Basel II)' Information Security Technical Report vol. 11, issue 1, pp. 32-38.
    • (2006) Information Security Technical Report , vol.11 , Issue.1 , pp. 32-38
    • Pinder, P.1
  • 23
    • 10644238912 scopus 로고    scopus 로고
    • Homeland security and information sharing: Federal policy considerations
    • Relyea, H. C. 2004, 'Homeland security and information sharing: Federal policy considerations' Government Information Quarterly vol. 21, issue 4, pp. 420-438.
    • (2004) Government Information Quarterly , vol.21 , Issue.4 , pp. 420-438
    • Relyea, H.C.1
  • 24
    • 24944436916 scopus 로고    scopus 로고
    • Sarbanes-Oxley-a huge boon to information security
    • Schultz, E. E. 2004, 'Sarbanes-Oxley-a huge boon to information security' Computers & Security vol. 23, Issue 5, pp. 353-354.
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 353-354
    • Schultz, E.E.1
  • 25
    • 0036038088 scopus 로고    scopus 로고
    • Information security-who cares?
    • Conference Publication No. 488, 17-19 April 2002
    • Shephard, B. 2002, 'Information security-who cares?' Power System Management and Control Conference Publication No. 488, 17-19 April 2002, pp.124-129.
    • (2002) Power System Management and Control , pp. 124-129
    • Shephard, B.1
  • 26
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
    • Siponen, M. T. 2005, 'Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods' Information and Organization vol. 15, issue 4, pp. 339-375.
    • (2005) Information and Organization , vol.15 , Issue.4 , pp. 339-375
    • Siponen, M.T.1
  • 27
    • 33747194078 scopus 로고    scopus 로고
    • Information Security Standards Focus on the Existence of Process, Not Its Content?
    • Siponen, M.T. 2006, 'Information Security Standards Focus on the Existence of Process, Not Its Content?' Communications of the ACM vol. 49, issue 8, pp. 97-100.
    • (2006) Communications of the ACM , vol.49 , Issue.8 , pp. 97-100
    • Siponen, M.T.1
  • 28
    • 0034814690 scopus 로고    scopus 로고
    • Information Security - A Multidimensional Discipline
    • von Solms, B. 2001, 'Information Security - A Multidimensional Discipline' Computers & Security vol. 20, pp. 504-508.
    • (2001) Computers & Security , vol.20 , pp. 504-508
    • von Solms, B.1
  • 29
    • 17844364638 scopus 로고    scopus 로고
    • Information Security governance: COBIT or ISO 17799 or both?
    • von Solms, B. 2005, 'Information Security governance: COBIT or ISO 17799 or both?' Computers & Security vol. 24, pp. 99-104.
    • (2005) Computers & Security , vol.24 , pp. 99-104
    • von Solms, B.1
  • 30
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • von Solms, B. & von Solms R. 2004, 'The 10 deadly sins of information security management' Computers & Security vol. 23, issue 5, pp. 371-376.
    • (2004) Computers & Security , vol.23 , Issue.5 , pp. 371-376
    • von Solms, B.1    von Solms, R.2
  • 32
    • 33745056813 scopus 로고    scopus 로고
    • The Sarbanes-Oxley Act and the changing role of the CIO and IT function
    • Sutton, S. G. & Arnold V. 2005, 'The Sarbanes-Oxley Act and the changing role of the CIO and IT function' Int. J. Business Information Systems vol. 1, issues 1/2.
    • (2005) Int. J. Business Information Systems , vol.1 , Issue.1-2
    • Sutton, S.G.1    Arnold, V.2
  • 33
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of ISO17799
    • Theoharidou, M., Kokolakis, S., Karyda M. & Kiountouzis, E. 2005, 'The insider threat to information systems and the effectiveness of ISO17799' Computers & Security vol. 24, pp. 472-484.
    • (2005) Computers & Security , vol.24 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 34
    • 84890025144 scopus 로고    scopus 로고
    • Implementation of ISO17799 and BS7799 in picture archiving and communication system: Local experience in implementation of BS7799 standard
    • Tong, C. K. S., Fung, K. H., Huang, H. Y. H. & Chan, K. K. 2003, 'Implementation of ISO17799 and BS7799 in picture archiving and communication system: local experience in implementation of BS7799 standard' International Congress Series.
    • (2003) International Congress Series
    • Tong, C.K.S.1    Fung, K.H.2    Huang, H.Y.H.3    Chan, K.K.4
  • 35
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • Whitman, M. E. 2003, 'Enemy at the gate: threats to information security' Communications of the ACM vol. 46, Issue 8.
    • (2003) Communications of the ACM , vol.46 , Issue.8
    • Whitman, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.