메뉴 건너뛰기




Volumn 9, Issue 15, 2009, Pages 2735-2743

Security mechanism in computer network environment: A study of adoption status in Malaysian company

Author keywords

Computer network; Security mechanism; Technology adoption

Indexed keywords

COMPUTER NETWORK ENVIRONMENT; DESCRIPTIVE STATISTICS; MAIN PROTECTION; SECURITY MECHANISM; SECURITY PERSONNEL; SELF-ADMINISTERED QUESTIONNAIRE; TECHNOLOGY ADOPTION; VULNERABILITY SCANNER;

EID: 69049092279     PISSN: 18125654     EISSN: 18125662     Source Type: Journal    
DOI: 10.3923/jas.2009.2735.2743     Document Type: Article
Times cited : (3)

References (22)
  • 1
    • 84874666102 scopus 로고    scopus 로고
    • Bitpipe.com
    • Bitpipe.com, 2007. Network monitoring. http://www.bitpipe.com/tlist/Network-Monitoring.html.
    • (2007) Network monitoring
  • 2
    • 0042217161 scopus 로고
    • Security in open and distributed system
    • Caelli, W.J., 1994. Security in open and distributed system. Inform. Manage. Comput. Secur., 2: 18-24.
    • (1994) Inform. Manage. Comput. Secur. , vol.2 , pp. 18-24
    • Caelli, W.J.1
  • 3
    • 67650084392 scopus 로고    scopus 로고
    • Collaborative commerce in supply chain management: A study of adoption status in malaysian electrical and electronic industry
    • Chong, A.Y.L. and K.B. Ooi, 2008. Collaborative commerce in supply chain management: A study of adoption status in malaysian electrical and electronic industry. J. Applied Sci., 8: 3836-3844.
    • (2008) J. Applied Sci. , vol.8 , pp. 3836-3844
    • Chong, A.Y.L.1    Ooi, K.B.2
  • 4
    • 51249090257 scopus 로고    scopus 로고
    • Managing networks security: Simulating network security
    • Cohen, F., 1999. Managing networks security: Simulating network security. Network Secur., 4: 6-13.
    • (1999) Network Secur. , vol.4 , pp. 6-13
    • Cohen, F.1
  • 5
    • 0032164246 scopus 로고    scopus 로고
    • Network security: It's time to take it seriously
    • Down, P.W. and J.T. McHenry, 1998. Network security: It's time to take it seriously. IEEE Comput. Soc., 31: 24-28.
    • (1998) IEEE Comput. Soc. , vol.31 , pp. 24-28
    • Down, P.W.1    McHenry, J.T.2
  • 6
    • 84874654293 scopus 로고    scopus 로고
    • Eset.com
    • Eset.com, 2007. Definitions of malware: Rootkit. http://www.eset.com/threat-center/threats/rootkit.php.
    • (2007) Definitions of malware: Rootkit
  • 7
    • 84888295144 scopus 로고
    • Security and network management: Changes in the way we work
    • Forcht, K.A. and Y.W.A. Tsai, 1994. Security and network management: Changes in the way we work. Inform. Manage. Comput. Secur., 2: 35-41.
    • (1994) Inform. Manage. Comput. Secur. , vol.2 , pp. 35-41
    • Forcht, K.A.1    Tsai, Y.W.A.2
  • 10
    • 69049120867 scopus 로고    scopus 로고
    • Designing Secure Networks Based on the Software Process Model
    • Digital Integrity LLC., Springer
    • Innella, P., 2000. Designing Secure Networks Based on the Software Process Model. Tetrad. Digital Integrity LLC., Springer.
    • (2000) Tetrad
    • Innella, P.1
  • 13
    • 0036192089 scopus 로고    scopus 로고
    • Evaluation and selection of an antivirus and content filtering software
    • Mamaghani, F., 2002. Evaluation and selection of an antivirus and content filtering software. Inform. Manage. Comput. Secur., 10: 28-32.
    • (2002) Inform. Manage. Comput. Secur. , vol.10 , pp. 28-32
    • Mamaghani, F.1
  • 16
    • 0042484572 scopus 로고    scopus 로고
    • CSI/FBI computer crime and security survey
    • Power, R., 2002. CSI/FBI computer crime and security survey. Comput. Secur. Issues Trends, 8: 1-22.
    • (2002) Comput. Secur. Issues Trends , vol.8 , pp. 1-22
    • Power, R.1
  • 17
    • 77954795581 scopus 로고    scopus 로고
    • 2008 CSI/FBI computer crime and security survey
    • Richardson, R., 2008. 2008 CSI/FBI computer crime and security survey. Comput. Secur. Issues Trends, 8: 1-30.
    • (2008) Comput. Secur. Issues Trends , vol.8 , pp. 1-30
    • Richardson, R.1
  • 19
    • 38349163767 scopus 로고    scopus 로고
    • User perceptions of software with embedded spyware
    • Sipior, J.C. and B.T. Ward, 2008. User perceptions of software with embedded spyware. Inform. Manage. Comput. Secur., 21: 13-23.
    • (2008) Inform. Manage. Comput. Secur. , vol.21 , pp. 13-23
    • Sipior, J.C.1    Ward, B.T.2
  • 21
    • 19444365650 scopus 로고    scopus 로고
    • Information security technologies as a commodity input
    • Steward, A., 2005. Information security technologies as a commodity input. Inform. Manage. Comput. Secur., 13: 5-15.
    • (2005) Inform. Manage. Comput. Secur. , vol.13 , pp. 5-15
    • Steward, A.1
  • 22
    • 69049113015 scopus 로고
    • The Star Malaysia, Malaysia, Sept. 8, 1992
    • The Star Malaysia, 1986. 17, 712 bank fraud cases since 1986. Malaysia, Sept. 8, 1992.
    • (1986) 17, 712 Bank Fraud Cases since 1986


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.