메뉴 건너뛰기




Volumn 16, Issue 2, 2007, Pages 114-122

It security management and business process automation: Challenges, approaches, and rewards

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84859059243     PISSN: 1065898X     EISSN: None     Source Type: Journal    
DOI: 10.1080/10658980601051706     Document Type: Article
Times cited : (21)

References (17)
  • 1
    • 85023962837 scopus 로고    scopus 로고
    • Do the right thing' for continuous protection and network safety
    • October 7. http://www.com- puterworld.com/securitytopics/security/story/0,10801,96417,00. html
    • De Santis, J. (2004). –Do the right thing' for continuous protection and network safety.— Computerworld, October 7. http://www.com- puterworld.com/securitytopics/security/story/0,10801,96417,00. html
    • (2004) Computerworld
    • De Santis, J.1
  • 2
    • 85024031323 scopus 로고    scopus 로고
    • How much security is enough?
    • March. http://cio-asia.com/ShowPage.aspx?pagetype=2& articleid=278&pubid=5&issueid=25
    • Ye, T.-S. and Hon, L.-W. (2005). How Much Security Is Enough? CIO Asia, March. http://cio-asia.com/ShowPage.aspx?pagetype=2& articleid=278&pubid=5&issueid=25
    • (2005)
    • Ye, T.-S.1    Hon, L.-W.2
  • 3
    • 57149133069 scopus 로고    scopus 로고
    • The critical success factor method: Establishing a foundation for enterprise security management
    • Richard A. Caralli et al., –The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management,— Carnegie Mellon University Software Engineering Institute, July 2004.
    • (2004) Carnegie Mellon University Software Engineering Institute
    • Caralli, R.A.1
  • 4
    • 85024064850 scopus 로고    scopus 로고
    • Action-forcing mechanisms encourage policy compliance
    • April 14. http://searchsecurity. techtarget.com/tip/1,289483, sid14_gci959197,00.html
    • Wood, C. C. (2004). Action-forcing mechanisms encourage policy compliance. SearchSecurity.com, April 14. http://searchsecurity. techtarget.com/tip/1,289483, sid14_gci959197,00.html
    • (2004) Searchsecurity.Com
    • Wood, C.C.1
  • 5
    • 84993099250 scopus 로고    scopus 로고
    • Implementing an information security awareness program
    • May/June
    • Peltier, T. R. (2005). Implementing an Information Security Awareness Program. Security Management Practices, May/June, p. 37.
    • (2005) Security Management Practices , pp. 37
    • Peltier, T.R.1
  • 6
    • 85024055619 scopus 로고    scopus 로고
    • Four ways to measure security success
    • March 22.9
    • Chapple, M. (2005). Four ways to measure security success. Search- Security, March 22.9.
    • (2005) Search- Security
    • Chapple, M.1
  • 7
    • 85024026668 scopus 로고    scopus 로고
    • May 25. http://searchsecurity. techtarget.com/tip/1,289483, sid14_gci966036,00.html
    • Berg, A. (2004). Six key practices for a successful Interdepartmental security committee. SearchSecurity, May 25. http://searchsecurity. techtarget.com/tip/1,289483, sid14_gci966036,00.html
    • (2004) Searchsecurity
    • Berg, A.1
  • 8
    • 53349117012 scopus 로고    scopus 로고
    • The future of security
    • December 15. http://www.cio.com/archive/121503/securityfuture.html
    • Berinato, S. (2003). The Future of Security. CIO Magazine, December 15. http://www.cio.com/archive/121503/securityfuture.html
    • (2003) CIO Magazine
    • Berinato, S.1
  • 9
    • 85024036718 scopus 로고    scopus 로고
    • Study: Insider revenge often behind business cyberattacks
    • Vijayan, J. (2005). Study: Insider Revenge Often Behind Business Cyberattacks. Computerworld, May 23. http://www.computer- world.com/securitytopics/security/story/0,10801,101900,00.html
    • (2005)
    • Vijayan, J.1
  • 10
    • 85024023700 scopus 로고    scopus 로고
    • All the rage: Security spending not a solution to problems
    • March 7. http://www.nwc.secu- ritypipeline.com/trends/60401432
    • Vacca, J. R. (2005). All the Rage: Security Spending Not a Solution to Problems. Network Computing, March 7. http://www.nwc.secu- ritypipeline.com/trends/60401432.
    • (2005) Network Computing
    • Vacca, J.R.1
  • 11
    • 85024021471 scopus 로고    scopus 로고
    • Addicted to security?
    • March 23. http://www.esecurityplanet.com/best_practices/article.php/ 3492251
    • Discini, S. (2005). Addicted to Security? eSecurity Planet, March 23. http://www.esecurityplanet.com/best_practices/article.php/ 3492251.
    • (2005) Esecurity Planet
    • Discini, S.1
  • 13
    • 85024055611 scopus 로고    scopus 로고
    • Managing for enterprise security
    • http://www.cert.org/archive/pdf/04tn046.pdf
    • Richard A. Caralli et al., –Managing for Enterprise Security,— Carnegie Mellon University Software Engineering Institute, December 2004, p. 4. http://www.cert.org/archive/pdf/04tn046.pdf
    • (2004) Carnegie Mellon University Software Engineering Institute , pp. 4
    • Caralli, R.A.1
  • 14
    • 85023973727 scopus 로고    scopus 로고
    • Opinion: Security is a process, not an endpoint
    • May 5. http://www.securitypipeline. com/policy_privacy/162600266
    • Sweeney, T. (2005). Opinion: Security Is a Process, Not an Endpoint. Security Pipeline, May 5. http://www.securitypipeline. com/policy_privacy/162600266
    • (2005) Security Pipeline
    • Sweeney, T.1
  • 15
    • 33750451548 scopus 로고    scopus 로고
    • Reducing enterprise risk with effective threat management
    • January/February
    • Drew, S. (2005). Reducing Enterprise Risk with Effective Threat Management. Information Security Management, January/February, p. 41.
    • (2005) Information Security Management , pp. 41
    • Drew, S.1
  • 16
    • 85024044307 scopus 로고    scopus 로고
    • Information security: Protecting critical assets in the new economy
    • April/May
    • Galletto, N. (2003). Information Security: Protecting Critical Assets in the New Economy. Government Purchasing Guide, April/May.
    • (2003) Government Purchasing Guide
    • Galletto, N.1
  • 17
    • 85024019874 scopus 로고    scopus 로고
    • Drew, S. (2005). p. 41.
    • (2005) , pp. 41
    • Drew, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.