메뉴 건너뛰기




Volumn 86, Issue , 2002, Pages 347-356

Information systems security and the information systems development project towards a framework for their integration

Author keywords

Development practices; Development project; IS Security integration

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS; INFORMATION SYSTEMS; LIFE CYCLE; MANAGEMENT INFORMATION SYSTEMS; SECURITY OF DATA;

EID: 84904322735     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: 10.1007/978-0-387-35586-3_28     Document Type: Conference Paper
Times cited : (1)

References (21)
  • 1
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • Anderson, R.I. (1993), “Why cryptosystems fail”, Communications o/the ACM, 37(11), pp 32-44.
    • (1993) Communications O/The ACM , vol.37 , Issue.11 , pp. 32-44
    • Anderson, R.I.1
  • 2
    • 0034140983 scopus 로고    scopus 로고
    • A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls
    • Barnard, L. and von Solms, R. (2000), “A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls”, Computers & Security, Vol 19 No 2, pp 185-194.
    • (2000) Computers & Security , vol.19 , Issue.2 , pp. 185-194
    • Barnard, L.1    Von Solms, R.2
  • 3
    • 0027804413 scopus 로고
    • Information Systems Security Design Methods: Implications for Information Systems Development
    • Baskerville, R. (1993), “Information Systems Security Design Methods: Implications for Information Systems Development”, ACM Computing Surveys, Vol. 25, No.4, pp 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 6
    • 0004133988 scopus 로고
    • Application and Context, Prentice Hall
    • Downs, E., Clare, P. and Coe, I. (1992), SSADM: Application and Context, Prentice Hall.
    • (1992) SSADM
    • Downs, E.1    Clare, P.2    Coe, I.3
  • 7
    • 0011420621 scopus 로고    scopus 로고
    • Information Security: Process Evaluation and Product Evaluation
    • S. Qing and J. Eloff (Eds.), Kluwer Academic Publishers
    • Eloff, M., and Von Solms, B. (2000), “Information Security: Process Evaluation and Product Evaluation”, in Information Security for Global Information Infrastructures, S. Qing and J. Eloff (Eds.), Kluwer Academic Publishers, pp 11-19.
    • (2000) Information Security for Global Information Infrastructures , pp. 11-19
    • Eloff, M.1    Von Solms, B.2
  • 8
    • 0031631068 scopus 로고    scopus 로고
    • A conceptual framework for information security management
    • Finne, T. (1998), “A conceptual framework for information security management”, Computers & Security, Vol 17, pp 303-307.
    • (1998) Computers & Security , vol.17 , pp. 303-307
    • Finne, T.1
  • 9
    • 21344479361 scopus 로고
    • Integrating case study and survey research methods: An example in information systems
    • Gable, G.G. (1994), “Integrating case study and survey research methods: An example in information systems”, European Journal of Information Systems, Vol. 3, No.2, pp 112-126.
    • (1994) European Journal of Information Systems , vol.3 , Issue.2 , pp. 112-126
    • Gable, G.G.1
  • 10
    • 0011418384 scopus 로고
    • Integrating Data Security into the Systems Development Life Cycle
    • Hayam, A. and Oz, E. (1993), “Integrating Data Security into the Systems Development Life Cycle”, Journal of Systems Management, Vol. 8 No 44, pp 16-20.
    • (1993) Journal of Systems Management , vol.8 , Issue.44 , pp. 16-20
    • Hayam, A.1    Oz, E.2
  • 11
    • 8644292339 scopus 로고
    • Achieving an Integrated Design: The Way Forward for Information Security
    • J. Ellof and S. von Solms (Eds.), Chapman & Hall
    • Hitchings I. (1995), “Achieving an Integrated Design: The Way Forward for Information Security”, in Information Security - the next decade, J. Ellof and S. von Solms (Eds.), Chapman & Hall.
    • (1995) Information Security - the Next Decade
    • Hitchings, I.1
  • 13
    • 0002606747 scopus 로고
    • A Biologically Inspired Immune System for Computers
    • R. Brooks and P. Maes (Eds.), MIT Press
    • Kephart, J.O. (1994), “A Biologically Inspired Immune System for Computers”, in Artificial life IV, R. Brooks and P. Maes (Eds.), MIT Press.
    • (1994) Artificial Life IV
    • Kephart, J.O.1
  • 14
    • 85105003482 scopus 로고    scopus 로고
    • A Framework for Comparing Cryptographic Libraries
    • S. Qing and J. Eloff (Eds.), International Academic Publishers
    • Moulinos, K., Kyrloglou, N. and Tryfonas, T. (2000), “A Framework for Comparing Cryptographic Libraries”, in IFIP/SEC 2000: Information Security, S. Qing and J. Eloff (Eds.), International Academic Publishers, pp 9-12.
    • (2000) IFIP/SEC 2000: Information Security , pp. 9-12
    • Moulinos, K.1    Kyrloglou, N.2    Tryfonas, T.3
  • 15
    • 0347566169 scopus 로고    scopus 로고
    • Problems, knowledge, solutions: Solving complex problems
    • Mumford, E. (1998), “Problems, knowledge, solutions: Solving complex problems”, Journal of Strategic Information Systems, 7, pp 255-269.
    • (1998) Journal of Strategic Information Systems , vol.7 , pp. 255-269
    • Mumford, E.1
  • 16
    • 0011644488 scopus 로고    scopus 로고
    • (2001), “An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications”
    • Dhillon, Idea Group Publishing
    • Siponen, M. (2001), “An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications”, in Information Security Management: Global Challenges in the New Millennium, G. Dhillon, Idea Group Publishing, pp 101-124.
    • Information Security Management: Global Challenges in the New Millennium, G , pp. 101-124
    • Siponen, M.1
  • 17
    • 84904254857 scopus 로고    scopus 로고
    • Security Concerns for Contemporary Development Practices: A Case Study
    • M. Dupuy and P. Paradinas (Eds.), Kluwer Academic Publishers
    • Tryfonas, T. and Kiountouzis, E. (2001), “Security Concerns for Contemporary Development Practices: A Case Study”, in Trusted Information: The new decade challenge, M. Dupuy and P. Paradinas (Eds.), Kluwer Academic Publishers, pp 421-435.
    • (2001) Trusted Information: The New Decade Challenge , pp. 421-435
    • Tryfonas, T.1    Kiountouzis, E.2
  • 18
    • 0035780469 scopus 로고    scopus 로고
    • Embedding security practices in contemporary information systems development approaches
    • Tryfonas, T., Kiountouzis, E. and Poulymenakou, A. (2001), “Embedding security practices in contemporary information systems development approaches”, Information Management & Computer Security, Vol. 9 No 4, pp 183-197.
    • (2001) Information Management & Computer Security , vol.9 , Issue.4 , pp. 183-197
    • Tryfonas, T.1    Kiountouzis, E.2    Poulymenakou, A.3
  • 19
    • 0003066147 scopus 로고
    • Organisational metaphors and information systems research
    • Walsham, G. (1991), “Organisational metaphors and information systems research”, European Journal of Information Systems, Vol. 1, No.2, pp 83-94.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 83-94
    • Walsham, G.1
  • 20
    • 33747470426 scopus 로고    scopus 로고
    • Strategic Analysis Report R-11-6534 (June), Gartner Research
    • Witty, R. et al (2001), The price of information security, Strategic Analysis Report R-11-6534 (June), Gartner Research.
    • (2001) The Price of Information Security
    • Witty, R.1
  • 21
    • 0011430405 scopus 로고
    • ISO 9000 and Information Security
    • Wood, c.c. and Snow, K. (1995), “ISO 9000 and Information Security”, Computers & Security, 14, pp 287-288.
    • (1995) Computers & Security , vol.14 , pp. 287-288
    • Wood, C.C.1    Snow, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.