메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-134

Information security governance

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84892825960     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-79984-1     Document Type: Book
Times cited : (71)

References (36)
  • 2
    • 84892807809 scopus 로고    scopus 로고
    • Wikipedia Corporate Governance, Accessed 2 April
    • Wikipedia Corporate Governance. Available from http://en.wikipedia.org/ wiki/Corporate-governance. Accessed 2 April 2008
    • (2008)
  • 3
    • 84892795596 scopus 로고    scopus 로고
    • IT governance: The safe way to effective and efficient governance
    • 21 March 2008
    • Ioannis Chalaris et al. (2005) IT Governance: The Safe Way to Effective and Efficient Governance. E-Journal of Science and Technology, 1, 59-63. Available from http://e-jst.teiath.gr/eng/halaris.pdf.Access 21 March 2008
    • (2005) E-Journal of Science and Technology , vol.1 , pp. 59-63
    • Chalaris, I.1
  • 4
    • 84892803618 scopus 로고    scopus 로고
    • Avijit Sikder Corporate Governance, Accessed 21 March 2008
    • Avijit Sikder Corporate Governance. http://www.asikder.com/documents/ Corporate%20 Governance.doc. Accessed 21 March 2008
  • 5
    • 0038424528 scopus 로고    scopus 로고
    • King 2, Johannesburg, South Africa
    • King 2 (2002) Report on Corporate Governance. Available from the Institute of Directors, Johannesburg, South Africa, http://www.iodsa.co.za
    • (2002) Report on Corporate Governance
  • 6
  • 7
    • 25644456506 scopus 로고    scopus 로고
    • 2nd Edition. IT Governance Institute
    • Board Briefing on IT Governance (2003). 2nd Edition. IT Governance Institute. Available from ISACA http://www.isaca.org
    • (2003) Board Briefing on IT Governance
  • 8
    • 25644456506 scopus 로고    scopus 로고
    • 2nd Edition. IT Governance Institute
    • Board Briefing on IT Governance (2003). 2nd Edition. IT Governance Institute. Available from ISACA www.isaca.org
    • (2003) Board Briefing on IT Governance
  • 17
    • 84892787789 scopus 로고
    • EU Privacy Directive 95/46/EC, Accessed 21 March 2008
    • EU Privacy Directive 95/46/EC (1995). Available from http://www.cdt.org/ privacy/eudirective/EU-Directive-.html. Accessed 21 March 2008
    • (1995)
  • 18
    • 1342336867 scopus 로고    scopus 로고
    • Accessed 21 March 2008
    • The Sarbanes-Oxley Act (2002). Available from http://www.soxlaw.com/. Accessed 21 March 2008
    • (2002) The Sarbanes-Oxley Act
  • 19
    • 84892824389 scopus 로고    scopus 로고
    • HIPAA (1006) The Health Insurance Portability and Accountability Act, Accessed 21 March
    • HIPAA (1006). The Health Insurance Portability and Accountability Act. Available from http://en.wikipedia.org/wiki/Health-Insurance-Portability-and- Accountability-Act. Accessed 21 March 2008
    • (2008)
  • 20
    • 0347015653 scopus 로고    scopus 로고
    • Accessed 21 March 2008
    • Gramm-Leach-Bliley Act (1999). Available from http://en.wikipedia.org/ wiki/Gramm-Leach-Bliley-Act. Accessed 21 March 2008
    • (1999) Gramm-Leach-Bliley Act
  • 21
    • 84892806355 scopus 로고    scopus 로고
    • National cyber security summit task force
    • Accessed on 2 April 2008
    • Information Security Governance-A Call to Action (2004). National Cyber Security Summit Task Force. Available from http://www.entrust.com/news/2004/ corporategovernancetaskforce. pdf?entsrc=isgfullreport. Accessed on 2 April 2008
    • (2004) Information Security Governance-A Call to Action
  • 22
    • 33748116536 scopus 로고    scopus 로고
    • Information security governance: A model based on the direct-control cycle
    • Von Solms R, von Solms, SH (2006) Information Security Governance: A Model Based on the Direct-Control Cycle. Computers & Security, 25(6), 408-412
    • (2006) Computers & Security , vol.25 , Issue.6 , pp. 408-412
    • Von Solms, R.1    Von Solms, S.H.2
  • 24
    • 17844364638 scopus 로고    scopus 로고
    • Information security governance: COBIT or ISO 17799 or Both?
    • Von Solms, SH (2005) Information Security Governance: COBIT or ISO 17799 or Both? Computers & Security, 24(2), 99-104
    • (2005) Computers & Security , vol.24 , Issue.2 , pp. 99-104
    • Von Solms, S.H.1
  • 34
    • 24644448811 scopus 로고    scopus 로고
    • Information security governance-compliance management vs operational management
    • Von Solms, SH (2005) Information Security Governance-Compliance Management vs Operational Management. Computers & Security, 24(6), 443-447
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 443-447
    • Von Solms, S.H.1
  • 36
    • 46649112592 scopus 로고    scopus 로고
    • Accessed 13 April
    • Chapman, A. Conscious Competence Learning Model. Available from http://www.busi nessballs.com/consciouscompetencelearningmodel.htm. Accessed 13 April 2007
    • (2007) Conscious Competence Learning Model
    • Chapman, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.