資訊安全評估準則層級結構之研究

dc.contributor.author洪國興zh_tw
dc.contributor.author季延平zh_tw
dc.contributor.author趙榮耀zh_tw
dc.contributor.authorKwo-Shing Hongen_US
dc.contributor.authorYen-Ping Chien_US
dc.contributor.authorLouis R. Chaoen_US
dc.date.accessioned2014-10-27T15:20:28Z
dc.date.available2014-10-27T15:20:28Z
dc.date.issued2003-10-??zh_TW
dc.description.abstract各種調查或研究均顯示,資訊安全事故的發生比例與其所造成的財務損失均不斷上升。美國911事件、台灣納莉颱風的水災、財金公司的舞弊案等,均顯示隨著資訊科技的快速發展,資訊系統使用者的範圍不斷擴大,組織對資訊系統依賴程度的提高,資訊安全因而日愈重要。但組織資訊安全如何評估?應考慮那些評估準則?尚乏實証研究。本研究以資訊安全管理「整合系統理論」(Integrated System Theory)為基礎,經由因素分析、名目群組技術(Nominal Group Technique)的程序,匯集專家意見,建構「資訊安全評估準則層級結構」,共有9個評估構面,37項評估準則,可作為組織規劃資訊安全策略之參考,亦可作為繼續發展「資訊安全多準則評估模式」(Information Security Multiple Criteria Valuation Model)的基礎,實為資訊安全管理實証研究的重要里程碑。zh_tw
dc.description.abstractMost results of various investigations and studies have shown that the percentage of information security accidents occurred and the financial losses caused are increasing continuously. September 11 attacks in the U.S.A., floods of Nari typhoon and malfeasant cases of Financial Information Service Co., Ltd. in Taiwan all indicate that information security has being more important day by day as a result of fast development of information technology, increasing range of users and dependence of an organization on information system. How to evaluate information security of an organization and what valuation criteria should be considered still lack of empirical studies. On the basis of“Integrated System Theory” of information security management, the study applies factor analysis and nominal group technique and collects opinions from experts to construct “Hierarchical Structure of Information Security Valuation Criteria”, which totally includes 9 valuation dimensions and 37 valuation criteria. The result may not only be a reference for the organization to make information security policies but also the foundation to further develop “Information Security Multiple Criteria Valuation Model”. It is obviously a key milestone of empirical studies of information security management.en_US
dc.identifierF46D1C35-7C98-E872-F7D3-4CB3233063A0zh_TW
dc.identifier.urihttp://rportal.lib.ntnu.edu.tw/handle/20.500.12235/15648
dc.language中文zh_TW
dc.publisher國立台灣師範大學圖書資訊研究所zh_tw
dc.publisherGraduate Institute of Library and Information Studiesen_US
dc.relation29(2),22-44zh_TW
dc.relation.ispartof圖書館學與資訊科學zh_tw
dc.subject.other資訊安全zh_tw
dc.subject.other整合系統理論zh_tw
dc.subject.other資訊安全評估zh_tw
dc.subject.other評估準則zh_tw
dc.subject.other層級結構zh_tw
dc.subject.otherInformation securityen_US
dc.subject.otherIntegrated system theoryen_US
dc.subject.otherInformation security valuationen_US
dc.subject.otherValuation criteriaen_US
dc.subject.otherHierarchical structureen_US
dc.title資訊安全評估準則層級結構之研究zh-tw
dc.title.alternativeA Study of Hierarchical Structure of Information Security Valuation Criteriazh_tw

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
ntnulib_ja_A1201_2902_044.pdf
Size:
148.44 KB
Format:
Adobe Portable Document Format