메뉴 건너뛰기




Volumn 100, Issue 5, 1999, Pages 213-227

Corporate information security management

Author keywords

Companies; Electronic information resources; Information security

Indexed keywords


EID: 84986133689     PISSN: 03074803     EISSN: None     Source Type: Journal    
DOI: 10.1108/03074809910285888     Document Type: Article
Times cited : (28)

References (32)
  • 3
    • 0001156375 scopus 로고
    • Managing computer crime: a research outlook
    • Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers and Security, Vol. 14, pp. 645-51.
    • (1995) Computers and Security , vol.14 , pp. 645-651
    • Backhouse, J.1    Dhillon, G.2
  • 6
    • 3342894277 scopus 로고    scopus 로고
    • Acceptable risks
    • 31 August
    • Dalton, G. (1998), “Acceptable risks”, InformationWeek, 31 August, pp. 36-48.
    • (1998) InformationWeek , pp. 36-48
    • Dalton, G.1
  • 8
    • 84986142544 scopus 로고    scopus 로고
    • Security survey: is it safe?
    • 8 September
    • Davis, B. (1997), “Security survey: is it safe?”, InformationWeek, 8 September, p. 42.
    • (1997) InformationWeek , pp. 42
    • Davis, B.1
  • 10
    • 84986142549 scopus 로고    scopus 로고
    • Smurf attack hits Minnesota
    • 17 March, available at, [Accessed April 1999]
    • Festa, P. (1998a), “Smurf attack hits Minnesota”, CNET News.com, 17 March, available at http://www.news.com/News/Item/0, 4, 20178, 00.html [Accessed April 1999]
    • (1998) CNET News.com
    • Festa, P.1
  • 11
    • 84986093570 scopus 로고    scopus 로고
    • Airport hack raises flags
    • 19 March, available at, [Accessed April 1999]
    • Festa, P. (1998b), “Airport hack raises flags”, CNET News.com, 19 March, available at http://www.news.com/News/Item/0, 4, 20278, 00html [Accessed April 1999]
    • (1998) CNET News.com
    • Festa, P.1
  • 13
    • 84986076705 scopus 로고    scopus 로고
    • Taking aim at cyberterrorism
    • 22 October, available at, [Accessed April 1999]
    • Goodin, D. (1997), “Taking aim at cyberterrorism”, CNET News.com, 22 October, available at http://www.news.com/News/Item/0, 4, 15516, 00.html [Accessed April 1999]
    • (1997) CNET News.com
    • Goodin, D.1
  • 15
    • 84986028855 scopus 로고    scopus 로고
    • Cyber leeches
    • 5 December
    • Hobby, J. (1996), “Cyber leeches”, Computer Weekly, 5 December, p. 46-47.
    • (1996) Computer Weekly , pp. 46-47
    • Hobby, J.1
  • 16
    • 0003692925 scopus 로고    scopus 로고
    • HMSO, London, available at, [Accessed April 1999]
    • House of Commons (1998), Data Protection Act 1998, HMSO, London, available at http://www.hmso. gov.uk/acts/acts1998/19980029.htm [Accessed April 1999]
    • (1998) Data Protection Act 1998
  • 18
    • 84986144534 scopus 로고    scopus 로고
    • Firms fall short of national standard on data security
    • 20 March
    • Kerridge, S. (1996), “Firms fall short of national standard on data security”, PC User, Vol. 279, 20 March, p. 14.
    • (1996) PC User , vol.279 , pp. 14
    • Kerridge, S.1
  • 20
    • 84986031421 scopus 로고    scopus 로고
    • Why security is failing to meet the standard
    • 14 March
    • Lambeth, J. (1996), “Why security is failing to meet the standard”, Computer Weekly, 14 March, p. 18.
    • (1996) Computer Weekly , pp. 18
    • Lambeth, J.1
  • 22
    • 84986028848 scopus 로고    scopus 로고
    • Anti-virus scanners: defending the network domain
    • April, available at, [Accessed April 1999]
    • Pallato, J. (1998), “Anti-virus scanners: defending the network domain”, Internet Computing, April, available at http://www.zdnet.com/products/ content/zdim/0304/287180.html [Accessed April 1999]
    • (1998) Internet Computing
    • Pallato, J.1
  • 23
    • 0004198635 scopus 로고    scopus 로고
    • 2nd ed, Prentice Hall International, Englewood Cliffs, NJ
    • Pfleeger, C.P. (1997), Security in Computing, 2nd ed., Prentice Hall International, Englewood Cliffs, NJ.
    • (1997) Security in Computing
    • Pfleeger, C.P.1
  • 24
    • 84986127853 scopus 로고    scopus 로고
    • Hackers, terrorists, and spies
    • October, available at, [Accessed April 1999]
    • Radcliff, D. (1997), “Hackers, terrorists, and spies”, Software Magazine, October, available at http://www.sentrytech.com/97issues/Oct99/sm107cv.htm [Accessed April 1999]
    • (1997) Software Magazine
    • Radcliff, D.1
  • 26
    • 84986035492 scopus 로고    scopus 로고
    • Main threat to Net security? Clueless user
    • 16 September
    • Schuman, E. (1996), “Main threat to Net security? Clueless user”, Communications Week, 16 September, pp. 24-6.
    • (1996) Communications Week , pp. 24-26
    • Schuman, E.1
  • 27
    • 84986028858 scopus 로고    scopus 로고
    • How ethical hackers pinpoint security weaknesses
    • 3 September
    • Taylor, P. (1997), “How ethical hackers pinpoint security weaknesses”, Financial Times Technology Section, 3 September, p. 1.
    • (1997) Financial Times Technology Section , pp. 1
    • Taylor, P.1
  • 28
    • 0346478937 scopus 로고    scopus 로고
    • IDG Books World wide Inc., Foster City
    • Vacca, J. (1996), Internet Security Secrets, IDG Books World wide Inc., Foster City
    • (1996) Internet Security Secrets
    • Vacca, J.1
  • 31
    • 24744441187 scopus 로고    scopus 로고
    • Profits embolden hackers
    • 23 March, available at, [Accessed April 1999]
    • Wilson, T. (1998), “Profits embolden hackers”, InternetWeek, 23 March, available at http://internetwk.com/news/news0323-4.htm [Accessed April 1999]
    • (1998) InternetWeek
    • Wilson, T.1
  • 32
    • 84992978545 scopus 로고    scopus 로고
    • Information owners, custodians, and users
    • Wood, C.C. (1996), “Information owners, custodians, and users”, Information Management and Computer Security, Vol. 4 No. 4, pp. 34-5.
    • (1996) Information Management and Computer Security , vol.4 , Issue.4 , pp. 34-35
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.