English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113303/144284 (79%)
Visitors : 50799685      Online Users : 826
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/100977


    Title: 網際網路時代資訊安全管理制度檢覈表之建立
    Other Titles: THE CONSTRUCTION OF CHECKLIST OF INFORMATION SECURITY MANAGEMENT SYSTEM IN INTERNET WORLD
    Authors: 耿筠;簡文慶
    Ken, Yun;Jian, Wen-Qing
    Keywords: 資訊安全;檢覈表;管理觀點
    Information security;Checklist;Managerial perspective
    Date: 2006-04
    Issue Date: 2016-08-31 16:35:13 (UTC+8)
    Abstract: 資訊安全是維護公司競爭力的基本與重要的管理機制。大多數討論此議題的論文是技術導向的,可能屬於電腦科學或資訊技術。除了這些學門外,資訊安全的管理觀點也是經營整體安全系統被關注的。本文強調後者。在本文的觀點下,資訊安全的管理機制可被視為是一連串片斷的、多元的、但互相有關連的功能。如果一家公司想要建立一套完整的系統以確保他們資訊的安全,他們必須檢視這些公司是否已經存在,並良好的整合。本文主要的貢獻是為現代企業建構一個資訊安全管理系統(Information Security Management System, ISMS)的檢覈表,對於尚未建立資訊安全管理制度的公司具有實務上的參考價值。
    Information Security is one of the most important and basic managerial mechanisms to maintain the competitiveness for an enterprise. Most papers involved in this topic echnical orientations, which might be computer science or information technology. Other than these disciplines, managerial perspective of information security is also coincided for operation an entire security system. This paper emphasizes he latter. In our viewpoint, managerial mechanisms of information security could be present by a series of fragmental, diversified, but interrelated functions. If a company wanted to establish a complete system to protecting their information secured, they had to check whether these functions had been already existed and integrated well. The main contribution of this paper is to construct a checklist of information security management system (ISMS), which is specially useful to those companies that had not installed their system.
    Relation: 政大智慧財產評論, 4(1), 45-62
    NCCU Intellectual Property Review
    Data Type: article
    Appears in Collections:[智慧財產評論] 期刊論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML2576View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback