Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
資訊安全系統執行地圖之研究 = A study for the impl...
~
許偉城
資訊安全系統執行地圖之研究 = A study for the implementation map of information security management system
Record Type:
Language materials, printed : monographic
Paralel Title:
A study for the implementation map of information security management system
Author:
許偉城,
Secondary Intellectual Responsibility:
簡德金,
Secondary Intellectual Responsibility:
國立虎尾科技大學
Place of Publication:
雲林縣
Published:
國立虎尾科技大學;
Year of Publication:
民96[2007]
Edition:
初版
Description:
62面圖,表 : 30公分;
Subject:
BS7799
Subject:
BS7799
Online resource:
http://140.130.12.251/ETD-db/ETD-search-c/view_etd?URN=etd-0531107-143144
Summary:
隨著網際網路技術與電子商務市場的高度成長,企業對資訊科技的需求與日俱增。但隨之而來的病毒與駭客入侵等資訊安全問題,卻無相應解決之道。其原因除企業對資訊安全相關知識的不足之外,尚無完整資訊安全執行架構與系統化步驟也是主因。 為解決此窘境,本研究參考BS7799系統,並以PDCA管理循環為基礎,來掌握資訊安全系統上各項重要構面與項目。接著,在Focus group interview與Delphi method等技術下,進行專家深度訪談,以確認其必要性、因果關係及其責任歸屬。此外,本研究也使用敘述性統計(Frequency Analysis),來確認各項目被重視的程度,以精簡構面中的項目,並運用模糊德爾菲法(Fuzzy Delphi Method)來確認執行架構與因果關係建立過程的穩定性。最後,本研究運用上述研究成果,並從管理及技術觀點,提出資訊安全管理系統之執行地圖。 相信,本研究所提出的執行地圖,將能協助企業掌握資訊安全系統中,各構面與項目其彼此之間的因果關係與重要度差異,進而提升建構系統過程中的完整度。另外,企業也能在此系統化執行程式中,降低摸索時間與失敗的可能性。 Following the market of internet network and e-commerce had become mature, the demand of information technology for enterprises had been important. But now there is no corresponding solution to solve the information security questions such as virus and hacker invading. Except that the implement framework and systematic steps are not perfected yet, the main reason is that most enterprises lack knowledge of information security management system (ISMS).To solve this awkward situation, this article consults BS7799 system and base on the PDCA management cycle to master the important domains and items of ISMS. Then, in order to confirm the necessity and the causality of each item, we carried out the expert’s profundity interview through Focus group interview and Delphi method. Meanwhile, this article also used the Fuzzy theory and Frequency Analysis to represent the difference of importance of each domains/items. Finally, we combine many scholars' framework of ISMS and set up the implementation map of ISMS on the points of management and technological.We believed this implementation map can assist enterprises to control the causality and the difference of importance and improve the completeness of ISS. Therefore it can enhance the ability of structuring the implement procedure for enterprise.
資訊安全系統執行地圖之研究 = A study for the implementation map of information security management system
許, 偉城
資訊安全系統執行地圖之研究
= A study for the implementation map of information security management system / 許偉城撰 - 初版. - 雲林縣 : 國立虎尾科技大學, 民96[2007]. - 62面 ; 圖,表 ; 30公分.
BS7799BS7799
簡, 德金
資訊安全系統執行地圖之研究 = A study for the implementation map of information security management system
LDR
:03657nam0 2200253 450
001
540367
010
0
$b
平裝
100
$a
20090420h akaa0chia50020302ba
101
0
$a
chi
102
$a
cw
105
$a
ak am 000yy
200
1
$a
資訊安全系統執行地圖之研究
$d
A study for the implementation map of information security management system
$f
許偉城撰
205
$a
初版
210
$a
雲林縣
$d
民96[2007]
$c
國立虎尾科技大學
215
0
$a
62面
$c
圖,表
$d
30公分
314
$a
指導教授:簡德金
328
$a
碩士論文--國立虎尾科技大學資訊管理研究所
330
$a
隨著網際網路技術與電子商務市場的高度成長,企業對資訊科技的需求與日俱增。但隨之而來的病毒與駭客入侵等資訊安全問題,卻無相應解決之道。其原因除企業對資訊安全相關知識的不足之外,尚無完整資訊安全執行架構與系統化步驟也是主因。 為解決此窘境,本研究參考BS7799系統,並以PDCA管理循環為基礎,來掌握資訊安全系統上各項重要構面與項目。接著,在Focus group interview與Delphi method等技術下,進行專家深度訪談,以確認其必要性、因果關係及其責任歸屬。此外,本研究也使用敘述性統計(Frequency Analysis),來確認各項目被重視的程度,以精簡構面中的項目,並運用模糊德爾菲法(Fuzzy Delphi Method)來確認執行架構與因果關係建立過程的穩定性。最後,本研究運用上述研究成果,並從管理及技術觀點,提出資訊安全管理系統之執行地圖。 相信,本研究所提出的執行地圖,將能協助企業掌握資訊安全系統中,各構面與項目其彼此之間的因果關係與重要度差異,進而提升建構系統過程中的完整度。另外,企業也能在此系統化執行程式中,降低摸索時間與失敗的可能性。 Following the market of internet network and e-commerce had become mature, the demand of information technology for enterprises had been important. But now there is no corresponding solution to solve the information security questions such as virus and hacker invading. Except that the implement framework and systematic steps are not perfected yet, the main reason is that most enterprises lack knowledge of information security management system (ISMS).To solve this awkward situation, this article consults BS7799 system and base on the PDCA management cycle to master the important domains and items of ISMS. Then, in order to confirm the necessity and the causality of each item, we carried out the expert’s profundity interview through Focus group interview and Delphi method. Meanwhile, this article also used the Fuzzy theory and Frequency Analysis to represent the difference of importance of each domains/items. Finally, we combine many scholars' framework of ISMS and set up the implementation map of ISMS on the points of management and technological.We believed this implementation map can assist enterprises to control the causality and the difference of importance and improve the completeness of ISS. Therefore it can enhance the ability of structuring the implement procedure for enterprise.
510
1
$a
A study for the implementation map of information security management system
610
0
$a
BS7799
$a
PDCA
$a
執行地圖
$a
資訊安全管理系統
610
1
$a
BS7799
$a
Implementation map
$a
Information security system
$a
PDCA
681
$a
008.161M
$b
0824
700
$a
許
$b
偉城
$3
523827
702
$a
簡
$b
德金
$3
418034
712
$a
國立虎尾科技大學
$b
工業工程與管理究所
$3
523742
770
$a
Wei-Cheng Hsu
$3
586712
772
$a
Te-King Chien
$3
541105
801
0
$a
cw
$b
虎尾科技大學
$c
20071207
$g
CCR
801
2
$a
cw
$b
虎尾科技大學
$c
20090420
$g
CCR
856
7
$2
http
$u
http://140.130.12.251/ETD-db/ETD-search-c/view_etd?URN=etd-0531107-143144
based on 0 review(s)
ALL
圖書館B1F 博碩士論文專區
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
T000775
圖書館B1F 博碩士論文專區
不流通(NON_CIR)
碩士論文(TM)
TM 008.161M 0824 96
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login