메뉴 건너뛰기




Volumn 26, Issue 4, 2009, Pages 584-593

Information security landscape and maturity level: Case study of Malaysian Public Service (MPS) organizations

Author keywords

Information security; Public Service organizations; Security management

Indexed keywords


EID: 69049098736     PISSN: 0740624X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.giq.2009.04.004     Document Type: Article
Times cited : (29)

References (54)
  • 1
    • 69049114070 scopus 로고    scopus 로고
    • Aceituno, V. C. (2004). ISM31.0. - Information security management maturity model, Institute for Security and Open Methodology. Retrieved January 10, 2005, from http://isecom.securenetltd.com/Security_Maturity_Model_v3.0.pdf
    • Aceituno, V. C. (2004). ISM31.0. - Information security management maturity model, Institute for Security and Open Methodology. Retrieved January 10, 2005, from http://isecom.securenetltd.com/Security_Maturity_Model_v3.0.pdf
  • 3
    • 0002698747 scopus 로고    scopus 로고
    • Information security management in the new millennium
    • Backhouse J., and Dhillon G. Information security management in the new millennium. Communications of the ACM 43 (2000) 125-128
    • (2000) Communications of the ACM , vol.43 , pp. 125-128
    • Backhouse, J.1    Dhillon, G.2
  • 5
    • 69049097209 scopus 로고    scopus 로고
    • Magazine. Retrieved October 19, 2004, from
    • Berinato, S. (2003). After the storm, reform. CIO Magazine. Retrieved October 19, 2004, from http://www.cio.com/archive/121503/securityfuture.html
    • (2003) After the storm, reform
    • Berinato, S.1
  • 8
    • 69049084670 scopus 로고    scopus 로고
    • BS7799 British Standard on Information Security System Management, 2000, Retrieved August 10, 2003, from
    • BS7799 (British Standard on Information Security System Management) (2000). Retrieved August 10, 2003, from http://www.bsi-global.com/Corporate/17799.xalter
  • 9
    • 69049092843 scopus 로고    scopus 로고
    • Carnegie-Mellon University. Software Engineering Institute. Retrieved October 19, 2004, from
    • Caralli, R. A. & Wilson, W.R. (2003). The challenges of security management. Carnegie-Mellon University. Software Engineering Institute. Retrieved October 19, 2004, from http://www.cert.org/archive/pdf/Esmchallenges.pdf
    • (2003) The challenges of security management
    • Caralli, R.A.1    Wilson, W.R.2
  • 10
    • 69049086787 scopus 로고    scopus 로고
    • Control objectives for information and related technology: Management guidelines
    • COBIT , Illinois: ISACA, Retrieved April 20, 2004, from
    • COBIT (2000). Control objectives for information and related technology: Management guidelines. Information Systems, Audit, and Control Foundation. Illinois: ISACA, 1997. Retrieved April 20, 2004, from http://www.isaca.org/cobit.htm
    • (1997) Information Systems, Audit, and Control Foundation
  • 13
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: A hierarchical framework for various approaches
    • Eloff M.M., and Solms S.H. Information security management: A hierarchical framework for various approaches. Computers and Security 19 3 (2000) 243-256
    • (2000) Computers and Security , vol.19 , Issue.3 , pp. 243-256
    • Eloff, M.M.1    Solms, S.H.2
  • 16
    • 0042363355 scopus 로고    scopus 로고
    • The application of information security policies in large UK-based organizations: An exploratory investigation
    • Fulford H., and Doherty N.F. The application of information security policies in large UK-based organizations: An exploratory investigation. Information Management & Computer Security 11 3 (2003) 106-114
    • (2003) Information Management & Computer Security , vol.11 , Issue.3 , pp. 106-114
    • Fulford, H.1    Doherty, N.F.2
  • 18
    • 69049087850 scopus 로고    scopus 로고
    • Policy development
    • Tipton H.F., and Kraus M. (Eds), Auerbach Publications, New York
    • Hare C. Policy development. In: Tipton H.F., and Kraus M. (Eds). Information security management handbook. 4th ed. Vol. 3 (2002), Auerbach Publications, New York
    • (2002) Information security management handbook. 4th ed. , vol.3
    • Hare, C.1
  • 20
    • 69049083580 scopus 로고    scopus 로고
    • ISO/IEC 17799 (2005). Information technology - Code of practice for information security management. Geneva: International Organization for Standardization. Retrieved June 24, 2004, from http://www.iso.org
    • ISO/IEC 17799 (2005). Information technology - Code of practice for information security management. Geneva: International Organization for Standardization. Retrieved June 24, 2004, from http://www.iso.org
  • 21
    • 25644456506 scopus 로고    scopus 로고
    • IT Governance Institute , Retrieved August 11, 2004, from
    • IT Governance Institute (2005). Board briefing on IT governance. Retrieved August 11, 2004, from http://www.itgi.org
    • (2005) Board briefing on IT governance
  • 22
    • 64949178299 scopus 로고    scopus 로고
    • Malaysian Public Service Department (Jabatan Perkhidmatan Awam Malaysia)
    • JPA
    • JPA (2005). Malaysian Public Service Department (Jabatan Perkhidmatan Awam Malaysia). Proceedings of Public Service Conference 2005.
    • (2005) Proceedings of Public Service Conference
  • 27
    • 69049104312 scopus 로고    scopus 로고
    • MAMPU, (2001). Malaysian Administrative Modernization and Management Planning Unit, Mekanisme Pelaporan Insiden Keselamatan Teknologi Maklumat dan Komunikasi (Information and Communications Technology Security Incident Reporting Mechanism), Malaysia Government General Circular No. 1 of 2001. http://www.mampu.gov.my/mampu/bm/program/Circulars/Security/SPAm012001.html
    • MAMPU, (2001). Malaysian Administrative Modernization and Management Planning Unit, Mekanisme Pelaporan Insiden Keselamatan Teknologi Maklumat dan Komunikasi (Information and Communications Technology Security Incident Reporting Mechanism), Malaysia Government General Circular No. 1 of 2001. http://www.mampu.gov.my/mampu/bm/program/Circulars/Security/SPAm012001.html
  • 29
    • 69049098237 scopus 로고    scopus 로고
    • Malaysia, Public Service ICT Strategic Plan Executive Summary. Retrieved August 23, 2005, from
    • MAMPU, (2003). Malaysian Administrative Modernization and Management Planning Unit, Malaysia, Public Service ICT Strategic Plan Executive Summary. Retrieved August 23, 2005, from www.mampu.gov.my/mampu/bi/program/ict/ISPlan/ISPlan.htm
    • (2003)
  • 31
    • 69049092841 scopus 로고    scopus 로고
    • Retrieved February 27, 2003, from and, http://www.giac.org/practical/gsec/Jerry_Marsh_GSEC.pdf
    • Marsh, J. (2003). Myths managers believe about security. Retrieved February 27, 2003, from http://www.sans.org/rr/start/myths.php and http://www.giac.org/practical/gsec/Jerry_Marsh_GSEC.pdf
    • (2003) Myths managers believe about security
    • Marsh, J.1
  • 32
    • 15744399299 scopus 로고    scopus 로고
    • Security and risk management: A fundamental business issue
    • July/Aug
    • McAdams A.C. Security and risk management: A fundamental business issue. Information Management Journal (2004) 36-44 July/Aug
    • (2004) Information Management Journal , pp. 36-44
    • McAdams, A.C.1
  • 33
    • 50749133016 scopus 로고
    • Control is fundamental to successful information security
    • Menkus B. Control is fundamental to successful information security. Computers & Security 10 1 (1991) 293-297
    • (1991) Computers & Security , vol.10 , Issue.1 , pp. 293-297
    • Menkus, B.1
  • 36
    • 48249152847 scopus 로고    scopus 로고
    • Info-terrorism in the age of the internet: Challenges and initiatives
    • Summer 2003
    • Nakra P. Info-terrorism in the age of the internet: Challenges and initiatives. Journal of Competitive Intelligence and Management 1 2 (2003) 1-10 Summer 2003
    • (2003) Journal of Competitive Intelligence and Management , vol.1 , Issue.2 , pp. 1-10
    • Nakra, P.1
  • 40
    • 69049107634 scopus 로고    scopus 로고
    • PWC , top issues report. Retrieved March 15, 2005, from
    • PWC (2004). Price Waterhouse Coopers - 2004 ISC2 top issues report. Retrieved March 15, 2005, from http://www.pwc.com
    • (2004) Price Waterhouse Coopers - 2004
  • 43
    • 0036434179 scopus 로고    scopus 로고
    • Towards maturity of information security maturity criteria: Six lessons learned from software maturity criteria
    • Siponen M. Towards maturity of information security maturity criteria: Six lessons learned from software maturity criteria. Information Management and Computer Security 10 5 (2002) 210-224
    • (2002) Information Management and Computer Security , vol.10 , Issue.5 , pp. 210-224
    • Siponen, M.1
  • 44
    • 0034989368 scopus 로고    scopus 로고
    • Corporate governance and information security
    • Solms S.H. Corporate governance and information security. Computers and Security 20 3 (2001) 215-218
    • (2001) Computers and Security , vol.20 , Issue.3 , pp. 215-218
    • Solms, S.H.1
  • 45
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security
    • Solms B., and Solms R. The 10 deadly sins of information security. Computers and Security 23 5 (2004) 371-376
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 371-376
    • Solms, B.1    Solms, R.2
  • 46
    • 69049085711 scopus 로고    scopus 로고
    • Retrieved July 24, 2004, from
    • Sommer, R. (2003). How to buy information security. Retrieved July 24, 2004, from http://www.virtualcity.co.uk.hottobuy.htm
    • (2003) How to buy information security
    • Sommer, R.1
  • 48
    • 0011587363 scopus 로고    scopus 로고
    • Information security program maturity grid
    • Stacey T.R. Information security program maturity grid. Information System Security 5 (1996) 22-33
    • (1996) Information System Security , vol.5 , pp. 22-33
    • Stacey, T.R.1
  • 49
    • 20444471025 scopus 로고    scopus 로고
    • Enterprise resilience: Managing risk in the networked economy
    • Spring, Retrieved May 20, 2005, from
    • Starr, R., Newfrock, J. & Delurey, M. (2003). Enterprise resilience: Managing risk in the networked economy. Strategy & Business, Spring 2003. Retrieved May 20, 2005, from http://www.strategy-business.com
    • (2003) Strategy & Business
    • Starr, R.1    Newfrock, J.2    Delurey, M.3
  • 52
    • 0003669849 scopus 로고    scopus 로고
    • John Wiley and Sons, Inc, New York
    • Vaughn E.J. Risk management (1997), John Wiley and Sons, Inc, New York
    • (1997) Risk management
    • Vaughn, E.J.1
  • 53
    • 33645209293 scopus 로고    scopus 로고
    • How software project risk affects project performance: An investigation of the dimensions of risk and an exploratory model
    • Spring 2004
    • Wallace L., Keil M., and Rai A. How software project risk affects project performance: An investigation of the dimensions of risk and an exploratory model. Decision Sciences 35 2 (2004) 289-320 Spring 2004
    • (2004) Decision Sciences , vol.35 , Issue.2 , pp. 289-320
    • Wallace, L.1    Keil, M.2    Rai, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.