메뉴 건너뛰기




Volumn 72, Issue , 2002, Pages 99-111

A new paradigm for adding security into is development methods

Author keywords

IS security

Indexed keywords

COMPUTER SUPPORTED COOPERATIVE WORK; INDUSTRIAL MANAGEMENT; INFORMATION SYSTEMS; INFORMATION USE; SECURITY OF DATA;

EID: 84904255922     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (37)
  • 3
    • 6744247045 scopus 로고
    • Logical Controls Specification: An approach to information system security
    • H. Klein & K. Kumar (eds, Amsterdam: North-Holland
    • Baskerville, R., (1989), Logical Controls Specification: An approach to information system security, In H. Klein & K. Kumar (eds.) systems development for human progress. Amsterdam: North-Holland.
    • (1989) Systems Development For Human Progress
    • Baskerville, R.1
  • 4
    • 0027804413 scopus 로고
    • Information Systems Security Design Methods: Implications for information Systems Development
    • December
    • Baskerville, R., (1993), Information Systems Security Design Methods: Implications for information Systems Development. ACM Computing Surveys 25, (4) December, pp. 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 5
    • 33750392472 scopus 로고    scopus 로고
    • Structural Artifacts in Method Engineering: The Security Imperative
    • S. Brinkkemper & K. Lyytinen & R. Welke (Eds, London: Chapman & Hall
    • Baskerville, R. (1996). Structural Artifacts in Method Engineering: The Security Imperative. In S. Brinkkemper & K. Lyytinen & R. Welke (Eds.), Method Engineering (pp. 8-28). London: Chapman & Hall.
    • (1996) Method Engineering , pp. 8-28
    • Baskerville, R.1
  • 9
    • 84904260675 scopus 로고
    • Code of Practice for Information Security Management, DISC PD003. British Standard Institution, London, UK
    • Code of Practice for Information Security Management, (1993), Department of Trade and Industry. DISC PD003. British Standard Institution, London, UK.
    • (1993) Department of Trade and Industry
  • 10
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Toward socio-organizational perspectives
    • Dhillon, G. and Backhouse, J., (2001), Current directions in IS security research: toward socio-organizational perspectives. Information Systems Journal. Vol 11, No 2.
    • (2001) Information Systems Journal , vol.11 , Issue.2
    • Dhillon, G.1    Backhouse, J.2
  • 16
    • 0041674320 scopus 로고
    • Levels of abstraction as a Conceptual Framework for an Information Systems
    • E. D. Falkenberg and P. Lindgreen (eds, North-Holland, Amsterdam
    • Iivari, J., (1989), Levels of abstraction as a Conceptual Framework for an Information Systems. In E. D. Falkenberg and P. Lindgreen (eds): Information System Concepts: An In-depth Analysis. North-Holland, Amsterdam.
    • (1989) Information System Concepts: An In-depth Analysis
    • Iivari, J.1
  • 17
    • 55249117361 scopus 로고
    • The PIOCO model for IS design
    • Iivari, J & Koskela, E., (1987), The PIOCO model for IS design, MIS Quarterly, Vol. 11, No. 3, pp. 401-419.
    • (1987) MIS Quarterly , vol.11 , Issue.3 , pp. 401-419
    • Iivari, J.1    Koskela, E.2
  • 21
    • 0009350342 scopus 로고
    • Methodology engineering: A Proposal for situation-specific Methodology construction
    • W.W. Cotterman & J.A. Senn (eds
    • Kumar, K. & Welke, R.J., (1992), Methodology engineering: A Proposal for situation-specific Methodology construction. In W.W. Cotterman & J.A. Senn (eds): Challenges andStrategies for research in systems development, pp. 257-269.
    • (1992) Challenges AndStrategies For Research In Systems Development , pp. 257-269
    • Kumar, K.1    Welke, R.J.2
  • 22
    • 0023170180 scopus 로고
    • Two Views on Information Modeling
    • Lyytinen, K., (1987), Two Views on Information Modeling. Information & Management, Vol. 12, pp. 9-19.
    • (1987) Information & Management , vol.12 , pp. 9-19
    • Lyytinen, K.1
  • 23
    • 0001935749 scopus 로고
    • A Taxonomic Perspective of Information Systems Development: Theoretical Constructs and Recommendations
    • R.J. Boland & R.A. Hirscheim (ed, John Wiley & Sons Ltd
    • Lyytinen, K., (1991), A Taxonomic Perspective of Information Systems Development: Theoretical Constructs and Recommendations. In R.J. Boland & R.A. Hirscheim (ed): Critical Issues in Information Systems Research, John Wiley & Sons Ltd.
    • (1991) Critical Issues In Information Systems Research
    • Lyytinen, K.1
  • 25
    • 0025211594 scopus 로고
    • The specification and modelling of computer security
    • January
    • McLean, J., (1990), The specification and modelling of computer security. IEEE Computer. January, vol. 23, issue 1, pp. 9-16.
    • (1990) IEEE Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 27
    • 0041601091 scopus 로고    scopus 로고
    • A primer to method engineering
    • S. Brinkkkemper & K. Lyytinen & R. Welke (Eds, London: Chapman & Hall
    • Odell, J. J. (1996). A primer to method engineering. In S. Brinkkkemper & K. Lyytinen & R. Welke (Eds.), Method Engineering: Principles of method construction and tool support (pp. 1-7). London: Chapman & Hall.
    • (1996) Method Engineering: Principles of Method Construction and Tool Support , pp. 1-7
    • Odell, J.J.1
  • 29
    • 0032124052 scopus 로고    scopus 로고
    • Modelling Data Secrecy and Integrity
    • North Holland
    • Pemul, G., Tjoa A. M., & Winiwarter, W., (1998), Modelling Data Secrecy and Integrity. Data & Knowledge Engineering. Vol. 26, pp. 291-308. North Holland.
    • (1998) Data & Knowledge Engineering , vol.26 , pp. 291-308
    • Pemul, G.1    Tjoa, A.M.2    Winiwarter, W.3
  • 32
    • 0027699087 scopus 로고
    • Lattice-based access controls
    • November
    • Sandhu, R.S., (1993), Lattice-based access controls. IEEE Computer. Vol. 26, no. 11, November, pp. 9-19.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 33
    • 0011644488 scopus 로고    scopus 로고
    • An analysis of the recent IS security development approaches: Descriptive and prescriptive implications
    • G. Dhillon (eds, Idea Group (2001)
    • Siponen, M.T., (2001), An analysis of the recent IS security development approaches: descriptive and prescriptive implications. In: G. Dhillon (eds:) Information Security Management - Global Challenges in the Next Millennium, Idea Group (2001).
    • (2001) Information Security Management - Global Challenges In the Next Millennium
    • Siponen, M.T.1
  • 35
    • 0001133137 scopus 로고    scopus 로고
    • Coping with Systems Risk: Security Planning Models for Management Decision Making
    • Straub, D.W. & Welke, R.J., (1998), Coping with Systems Risk: Security Planning Models for Management Decision Making. MIS Quarterly, Vol. 22, No. 4, p. 441-464.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.