조직내 정보시스템 보안 전략의 성공적 구현을 위한 정보시스템 보안 전략의 특성
-
-
저자
박상서
박춘식
-
제어번호
60038455
-
학술지명
융합보안 논문지
-
권호사항
Vol.
8
No.
3
[
2008
]
-
발행처
한국융합보안학회
-
발행처 URL
http://www.kcgsa.org
-
자료유형
학술저널
-
수록면
101-106
(
6쪽)
-
언어
Korean
-
출판년도
2008
-
등재정보
KCI등재
-
판매처
학술교육원
주제별 논문영향력
논문영향력
주제 |
주제별 논문수 |
주제별 피인용횟수 |
주제별 논문영향력 |
주제분류(KDC/DDC) |
프로그래밍, 프로그램, 데이터
|
24
|
2
|
|
계 |
|
24
|
2
|
|
* 다른 주제어 보유 논문에서 피인용된 횟수 |
1
|
|
'
조직내 정보시스템 보안 전략의 성공적 구현을 위한 정보시스템 보안 전략의 특성' 의 참고문헌
-
-
Why Information Security is Hard-An Economic Perspective
R. Anderson
17th Annual Computer Security Applications Conference( ACSAC) 2001 358 ~ 365
[2001]
-
The Need for In-Depth Cyber Defence Programs in Business Information Warfare Environments
S. Edwards
2nd Australian Information Warfare and Security Conf 56 (63) 56 ~ 63
[2001]
-
Strategic Approach to Information Security in Organizations
S. Park
T.Ruighaver
2008 International Conference on Information Science and Security(ICISS 2008) 26 ~ 31
[2008]
-
Soft Power. Foreign Policy, No. 80, Twentieth Anniversary
-
Social Defense Strategy:The Role of Technology
B. Martin
Journal of Peace Research 36 (5) 535 ~ 552
[1999]
-
Security in Mobile Ad Hoc Networks:Challenges and Solutions
H. Yang
IEEE Wireless Communications 11 (1) 38 ~ 47
[2004]
-
Security concerns of system users: A study of perceptionsof the adequacy of security
-
SALSA:A Method for Developing the Enterprise Security Architecture and Strategy
-
Resilient Infrastructure for Network Security
-
Report to the President, Cyber Security:A Crisis of Prioritization
M. R. Benioff
President’s Information Technology Advisory Committee( PITAC)
[2005]
-
Reflecting on 20 SEC Conferences
R. A. Botha
Computers and Security 25 (6) 247 ~ 256
[2006]
-
Overview of Cyber Security:A Crisis of Prioritization
S. Landau
IEEE Security and Privacy 3 (3) 9 ~ 11
[2005]
-
Organizational Context and the Success of Management Information Systems
P. Ein-Dor
Management Science 24 (10) 1064 ~ 1077
[1978]
-
Organizational Context and Information SystemsSuccess : A Contingency Approach
Raymond
Journal of Management Information Systems 6 (4) 5 ~ 20
[1990]
-
Military Strategy and the Outbreak of International Conflict:Quantitative Empirical Tests, 1903-1992
D. Reiter
The Journal of Conflict Resolution 43 (3) 366 ~ 387
[1992]
-
Managing for Enterprise Security
-
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness
-
Is Strategy an Illusion?
R. K. Betts
International Security 25 (2) 5 ~ 50
[2000]
-
Information Systems Security: Management Success Factors
C. C. Wood
Computers and Security 6 314 ~ 320
[1987]
-
Information Security Handbook A Guide for Managers(Draft), Recommendations of the National Institute of Standards and Technology
P. Bowen
National Institute of Standards and Technology
[2006]
-
Information Assurance:Strategic Alignment and Competitive Advantage
-
Guide to Malware Incident Prevention and Handling, Recommendations of the National Institute of Standards and Technology
P. Mel
National Institute of Standards and Technology
[2005]
-
Effective IS security: An empirical study
Straub
Information Systems Research 1 (3) 255 ~ 276
[1990]
-
Development of Security Policies
-
Determinants of Military Strategy, 1903-1994:A Quantitative Empirical Test
D. Reiter
International Studies Quarterly 43 (2) 363 ~ 387
[1994]
-
Cyber Defense:Art to Science
-
Cyber Defense Technology:Networking and Evaluation
R. Bajcsy
Communications of the ACM 47 (3) 58 ~ 61
[2004]
-
Current directions in IS securityresearch: Towards socio-organizational perspectives
-
Coping with Systems Risk: Security Planning Models for Management Decision Making
Straub
MIS Quarterly 22 (4) 441 ~ 469
[1998]
-
Computer Security in the Real World
-
Computer Security Incident Handling Guide, Recommendations of the National Institute of Standards and Technology
T. Grance
National Institute of Standards and Technology
[2004]
-
CSI Survey 2007:The 12th Annual Computer Crime and Security Survey
-
Autonomic Defense:Thwarting Automated Attacks via Real-Time Feedback Control
-
An Integrated Study of Information Systems Security Effectiveness
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
J. Mirkovic
ACM SIGCOMM Computer Communication Review 34 (2) 39 ~ 53
[2004]
-
A Practical Approach to Enterprise IT Security
S. Liu
IEEE IT Professional 3 (5) 35 ~ 42
[2001]
-
A Concept for Strategic Cyber Defense
W. Tirenin
Proc. of the MILCOM 1999 458 ~ 463
[1999]
'
조직내 정보시스템 보안 전략의 성공적 구현을 위한 정보시스템 보안 전략의 특성'
의 유사주제(
) 논문