조직내 정보시스템 보안 전략의 성공적 구현을 위한 정보시스템 보안 전략의 특성

논문상세정보
' 조직내 정보시스템 보안 전략의 성공적 구현을 위한 정보시스템 보안 전략의 특성' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 프로그래밍, 프로그램, 데이터
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
24 3

8.3%

' 조직내 정보시스템 보안 전략의 성공적 구현을 위한 정보시스템 보안 전략의 특성' 의 참고문헌

  • 조직 차원의 정보보안 전략의 개념
    박상서 융합보안 논문지 7 (3) 15 ~ 24 [2007]
  • Why Information Security is Hard-An Economic Perspective
    R. Anderson 17th Annual Computer Security Applications Conference( ACSAC) 2001 358 ~ 365 [2001]
  • The Need for In-Depth Cyber Defence Programs in Business Information Warfare Environments
    S. Edwards 2nd Australian Information Warfare and Security Conf 56 (63) 56 ~ 63 [2001]
  • Strategic Approach to Information Security in Organizations
    S. Park T.Ruighaver 2008 International Conference on Information Science and Security(ICISS 2008) 26 ~ 31 [2008]
  • Soft Power. Foreign Policy, No. 80, Twentieth Anniversary
    J. S. Nye-Jr. 153 ~ 171 [1990]
  • Social Defense Strategy:The Role of Technology
    B. Martin Journal of Peace Research 36 (5) 535 ~ 552 [1999]
  • Security in Mobile Ad Hoc Networks:Challenges and Solutions
    H. Yang IEEE Wireless Communications 11 (1) 38 ~ 47 [2004]
  • Security concerns of system users: A study of perceptionsof the adequacy of security
    D. L. Goodhue D.Straub Goodhue Information and Management 20 (1) 13 ~ 27 [1991]
  • SALSA:A Method for Developing the Enterprise Security Architecture and Strategy
    J. Sherwood Computers and Security 15 501 ~ 506 [1996]
  • Resilient Infrastructure for Network Security
    M. M. Williamson Complexity 9 (2) 34 ~ 40 [2004]
  • Report to the President, Cyber Security:A Crisis of Prioritization
    M. R. Benioff President’s Information Technology Advisory Committee( PITAC) [2005]
  • Reflecting on 20 SEC Conferences
    R. A. Botha Computers and Security 25 (6) 247 ~ 256 [2006]
  • Overview of Cyber Security:A Crisis of Prioritization
    S. Landau IEEE Security and Privacy 3 (3) 9 ~ 11 [2005]
  • Organizational Context and the Success of Management Information Systems
    P. Ein-Dor Management Science 24 (10) 1064 ~ 1077 [1978]
  • Organizational Context and Information SystemsSuccess : A Contingency Approach
    Raymond Journal of Management Information Systems 6 (4) 5 ~ 20 [1990]
  • Military Strategy and the Outbreak of International Conflict:Quantitative Empirical Tests, 1903-1992
    D. Reiter The Journal of Conflict Resolution 43 (3) 366 ~ 387 [1992]
  • Managing for Enterprise Security
  • Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness
    J. M. Torres ISC 2006 530 ~ 545 [2006]
  • Is Strategy an Illusion?
    R. K. Betts International Security 25 (2) 5 ~ 50 [2000]
  • Information Systems Security: Management Success Factors
    C. C. Wood Computers and Security 6 314 ~ 320 [1987]
  • Information Security Handbook A Guide for Managers(Draft), Recommendations of the National Institute of Standards and Technology
    P. Bowen National Institute of Standards and Technology [2006]
  • Information Assurance:Strategic Alignment and Competitive Advantage
    D. Birchall Grist Ltd. [2004]
  • Guide to Malware Incident Prevention and Handling, Recommendations of the National Institute of Standards and Technology
    P. Mel National Institute of Standards and Technology [2005]
  • Effective IS security: An empirical study
    Straub Information Systems Research 1 (3) 255 ~ 276 [1990]
  • Development of Security Policies
    J. ?lnes J.Olnes Computers and Security 13 (8) 628 ~ 636 [1994]
  • Determinants of Military Strategy, 1903-1994:A Quantitative Empirical Test
    D. Reiter International Studies Quarterly 43 (2) 363 ~ 387 [1994]
  • Cyber Defense:Art to Science
    O. S. Saydjari Communications of the ACM 47 (3) 53 ~ 57 [2004]
  • Cyber Defense Technology:Networking and Evaluation
    R. Bajcsy Communications of the ACM 47 (3) 58 ~ 61 [2004]
  • Current directions in IS securityresearch: Towards socio-organizational perspectives
    Dhillon Dhillon, G. G. Dhillon Information Systems Journal 11 127 ~ 153 [2001]
  • Coping with Systems Risk: Security Planning Models for Management Decision Making
    Straub MIS Quarterly 22 (4) 441 ~ 469 [1998]
  • Computer Security in the Real World
    B. W. Lampson Computer 37 (6) 37 ~ 46 [2004]
  • Computer Security Incident Handling Guide, Recommendations of the National Institute of Standards and Technology
    T. Grance National Institute of Standards and Technology [2004]
  • CSI Survey 2007:The 12th Annual Computer Crime and Security Survey
  • Autonomic Defense:Thwarting Automated Attacks via Real-Time Feedback Control
    D. Armstrong Complexity 9 (2) 41 ~ 48 [2004]
  • An Integrated Study of Information Systems Security Effectiveness
    A. Kankanhalli K.-K.Wei International Journal of Information Management 23 139 ~ 154 [2003]
  • A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
    J. Mirkovic ACM SIGCOMM Computer Communication Review 34 (2) 39 ~ 53 [2004]
  • A Practical Approach to Enterprise IT Security
    S. Liu IEEE IT Professional 3 (5) 35 ~ 42 [2001]
  • A Concept for Strategic Cyber Defense
    W. Tirenin Proc. of the MILCOM 1999 458 ~ 463 [1999]