메뉴 건너뛰기




Volumn 46, Issue 5, 2009, Pages 267-270

Information security management standards: Problems and solutions

Author keywords

Information security certification; Information security management; Information security management guidelines; Information security management standards; Information systems security

Indexed keywords

INFORMATION SECURITY CERTIFICATION; INFORMATION SECURITY MANAGEMENT; INFORMATION SECURITY MANAGEMENT GUIDELINES; INFORMATION SECURITY MANAGEMENT STANDARDS; INFORMATION SYSTEMS SECURITY;

EID: 67651102640     PISSN: 03787206     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.im.2008.12.007     Document Type: Article
Times cited : (250)

References (24)
  • 1
    • 33846027847 scopus 로고    scopus 로고
    • Circuits of power in creating de jure standards: shaping an international information systems security standard
    • Backhouse J., Hsu C., and Silva L. Circuits of power in creating de jure standards: shaping an international information systems security standard. MIS Quarterly 30 Special issue (2006) 413-438
    • (2006) MIS Quarterly , vol.30 , Issue.SPEC. ISSUE , pp. 413-438
    • Backhouse, J.1    Hsu, C.2    Silva, L.3
  • 2
    • 0013324190 scopus 로고
    • Risk analysis: an interpretative feasibility tool in justifying information systems security
    • Baskerville R. Risk analysis: an interpretative feasibility tool in justifying information systems security. European Journal of Information Systems 1 2 (1991) 121-130
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 3
    • 0026398826 scopus 로고
    • Risk analysis as a source of professional knowledge
    • Baskerville R. Risk analysis as a source of professional knowledge. Computers and Security 10 8 (1991) 749-764
    • (1991) Computers and Security , vol.10 , Issue.8 , pp. 749-764
    • Baskerville, R.1
  • 4
    • 0027804413 scopus 로고
    • Information systems security design methods: implications for information systems development
    • Baskerville R. Information systems security design methods: implications for information systems development. Computing Surveys 25 4 (1993) 375-414
    • (1993) Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 5
    • 67651114348 scopus 로고    scopus 로고
    • 7799BS, Code of Practice for Information Security Management, Department of Trade and Industry, DISC PD003, British Standard Institute, London, UK 1995
    • 7799BS, Code of Practice for Information Security Management, Department of Trade and Industry, DISC PD003, British Standard Institute, London, UK (1995).
  • 6
    • 67651085832 scopus 로고    scopus 로고
    • BS7799-1, Code of Practice for Information Security Management, Department of Trade and Industry, 1999
    • BS7799-1, Code of Practice for Information Security Management, Department of Trade and Industry, 1999.
  • 7
    • 67651092582 scopus 로고    scopus 로고
    • BS ISO/IEC 17799:2000 (BS 7799-1:2000), Information Technology - Code of Practice for Information Security Management, British Standards Institute, 2000.
    • BS ISO/IEC 17799:2000 (BS 7799-1:2000), Information Technology - Code of Practice for Information Security Management, British Standards Institute, 2000.
  • 8
    • 67651096331 scopus 로고    scopus 로고
    • BS 7799-2:2002 Information security management systems - Specification with guidance for use, BSI, UK, 2002.
    • BS 7799-2:2002 Information security management systems - Specification with guidance for use, BSI, UK, 2002.
  • 10
    • 67651123428 scopus 로고    scopus 로고
    • GASSP, Generally Accepted System Security Principles GASSP, Version 2.0, Information Systems Security, June, 8, no. 3, 1999
    • GASSP, Generally Accepted System Security Principles (GASSP), Version 2.0, Information Systems Security, June, vol. 8, no. 3, 1999.
  • 11
    • 67651090224 scopus 로고    scopus 로고
    • GAISP V3.0, 2003, http://www.issa.org/gaisp/_pdfs/v30.pdf.
    • GAISP V3.0, 2003, http://www.issa.org/gaisp/_pdfs/v30.pdf.
  • 16
    • 67651085831 scopus 로고    scopus 로고
    • Information Technology Security Evaluation Criteria (ITSEC), Harmonised Criteria of France, Germany, the Netherlands and the United Kingdom, 1990.
    • Information Technology Security Evaluation Criteria (ITSEC), Harmonised Criteria of France, Germany, the Netherlands and the United Kingdom, 1990.
  • 17
    • 67651109261 scopus 로고    scopus 로고
    • IT Baseline Protection Manual, BSI, Germany, 1996.
    • IT Baseline Protection Manual, BSI, Germany, 1996.
  • 19
    • 0040964323 scopus 로고
    • Data processing - risk assessment
    • Wofsey M. (Ed), John Wiley and Sons Ltd
    • Saltmarsh T., and Browne P. Data processing - risk assessment. In: Wofsey M. (Ed). Advances in Computer Security Management vol. 2 (1983), John Wiley and Sons Ltd 93-116
    • (1983) Advances in Computer Security Management , vol.2 , pp. 93-116
    • Saltmarsh, T.1    Browne, P.2
  • 20
    • 33747194078 scopus 로고    scopus 로고
    • Information security standards focus on the existence of process not its content?
    • Siponen M. Information security standards focus on the existence of process not its content?. Communications of the ACM 49 8 (2006) 97-100
    • (2006) Communications of the ACM , vol.49 , Issue.8 , pp. 97-100
    • Siponen, M.1
  • 21
    • 36248967046 scopus 로고    scopus 로고
    • Employees' adherence to information security policies: an empirical study
    • Sandton, Gauteng, South Africa
    • Siponen M., Pahnila S., and Mahmood A. Employees' adherence to information security policies: an empirical study. Proceedings of the IFIP SEC2007. Sandton, Gauteng, South Africa (2007)
    • (2007) Proceedings of the IFIP SEC2007
    • Siponen, M.1    Pahnila, S.2    Mahmood, A.3
  • 22
    • 67651092583 scopus 로고    scopus 로고
    • and
    • SSE-CMM, The Appraisal Method, v2.0 and v3.0, 1998, http://www.sse-cmm.org.
    • (1998) The Appraisal Method
  • 23
    • 0000280419 scopus 로고
    • Effective IS security: an empirical study
    • Straub D. Effective IS security: an empirical study. Information Systems Research 1 3 (1990) 255-276
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 24
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: a field study
    • Straub D., and Nance W. Discovering and disciplining computer abuse in organizations: a field study. MIS Quarterly 14 1 (1990) 45-60
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.1    Nance, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.