조직 정보 시스템 보안을 위한 총괄 전략 프레임워크
주제별 논문영향력
논문영향력
주제 |
주제별 논문수 |
주제별 피인용횟수 |
주제별 논문영향력 |
주제분류(KDC/DDC) |
프로그래밍, 프로그램, 데이터
|
24
|
1
|
|
계 |
|
24
|
1
|
|
* 다른 주제어 보유 논문에서 피인용된 횟수 |
0
|
|
'
조직 정보 시스템 보안을 위한 총괄 전략 프레임워크' 의 참고문헌
-
-
-
-
Understanding Concepts in the Defense in Depth Strategy
C. L. Smith
Proc. of the IEEE 37th International Carnahan Conference on Security Technology 8 ~ 16
[2003]
-
The Sources of Military Doctrine: France, Britain, and the Germany Between the World Wars
-
The Renaissance of Security Studies
S. M. Walt
International Studies Quarterly 35 (2) 211 ~ 239
[1991]
-
The Need for In-Depth Cyber Defence Progrmmes in Business Information Warfare Environments
S. Edwards
Proc. of the 2nd Australian Information Warfare and Security Conf 56 ~ 63
[2001]
-
The National Strategy to Secure Cyberspace
-
The Management of Strategy
-
The Forgotten Dimensions of Strategy
M. Howard
Foreign Affairs 57 (5) 975 ~ 986
[1979]
-
The Critical Success Factor Method:Establishing a Foundation for Enterprise Security Management
-
The Concept of Corporate Strategy, 3rd ed
-
-
-
Strategic Approach to Information Security in Organizations
S. Park
T.Ruighaver
Proc. of the 2008 IEEE International Conference on Information Science and Security(ICISS 2008) 26 ~ 31
[2008]
-
Static Analysis for Security
B. Chess
IEEE Security and Privacy 2 (6) 76 ~ 79
[2004]
-
Social Defense Strategy:The Role of Technology
B. Martin
Journal of Peace Research 36 (5) 535 ~ 552
[1999]
-
So What is Strategy?
R. Evered
Long Range Planning 16 (3) 57 ~ 72
[1983]
-
Security in Mobile Ad Hoc Networks:Challenges and Solutions
H. Yang
IEEE Wireless Communications 11 (1) 38 ~ 47
[2004]
-
SALSA:A Method for Developing the Enterprise Security Architecture and Strategy
-
Report to the President, Cyber Security:A Crisis of Prioritization
-
Reflecting on 20 SEC Conferences
R. A. Botha
Computers and Security 25 (6) 247 ~ 256
[2006]
-
Patterns in Strategy Formation
Mintzberg
Management Science 24 (9) 934 ~ 948
[1978]
-
Overview of Cyber Security:A Crisis of Prioritization
S. Landau
IEEE Security and Privacy 3 (3) 9 ~ 11
[2005]
-
Organizational Context and Information SystemsSuccess : A Contingency Approach
Raymond
Journal of Management Information Systems 6 (4) 5 ~ 20
[1990]
-
Organisational Security Culture:Extending the End-user Perspective
-
-
Offensive versus Defensive:Military Strategy and Alternative Defence
W. Agrell
Journal of Peace Research 24 (1) 75 ~ 85
[1987]
-
OECD Guidelines for the Security of Information Systems and Networks:Towards a Culture of Security
-
Moving Beyond Compliance: Ernst and Young’s 2008 Global Information Security Survey
Ernst
Ernst and Young
[2008]
-
Military Strategy and the Outbreak of International Conflict:Quantitative Empirical Tests, 1903-1992
D. Reiter
The Journal of Conflict Resolution 43 (3) 366 ~ 387
[1992]
-
Managing the Risk of Organizational Accidents
-
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness
J. M. Torres
Proc. of the ISC 2006. LNCS 4176 530 ~ 545
[2006]
-
Managed Security in the Enterprise(U.S. Enterprise), Symantec, Mar
-
Least Effort Strategies for Cybersecurity
S. P. Gorman
Proc. of the The Critical Infrastructure Project Workshop I:Working Papers 1 ~ 14
[2003]
-
Inhibiting Enterprise: Fraud and Online Crime Against Small Business
FSB
Federation of Small Businesses
[2009]
-
Information Systems Security: Management Success Factors
C. C. Wood
Computers and Security 6 314 ~ 320
[1987]
-
Information Security-The Third Wave?
-
Information Security-The Fourth Wave
-
Information Security Handbook A Guide for Managers, Recommendations of the National Institute of Standards and Technology
-
Guide to Malware Incident Prevention and Handling, Recommendations of the National Institute of Standards and Technology
-
From Preponderance to Offshore Balancing:America’s Future Grand Strategy
C. Layne
International Security 22 (1) 86 ~ 124
[1997]
-
Exploring Organisational Security Culture:Developing a Comprehensive Research Model
P. A. Chia
Proc. of the IS ONE World Conference
[2002]
-
Evaluating Information Assurance Strategies
-
Effective IS security: An empirical study
Straub
Information Systems Research 1 (3) 255 ~ 276
[1990]
-
Development of Security Policies
-
Determinants of Military Strategy, 1903-1994:A Quantitative Empirical Test
D. Reiter
International Studies Quarterly 43 (2) 363 ~ 387
[1994]
-
Defensive Information Warfare
-
Cyberwar Strategy and Tactics
L. S. Tinnel
Proc. of the 2002 IEEE Workshop on Information Assurance, United States Military Academy 228 ~ 234
[2002]
-
Cyber Defense:Art to Science
-
Coping with Systems Risk: Security Planning Models for Management Decision Making
Straub
MIS Quarterly 22 (4) 441 ~ 469
[1998]
-
Computer security management>
-
Computer Security in the Real World
-
Computer Security Incident Handling Guide, NIST Special Publication 800-61
-
Autonomic Defense:Thwarting Automated Attacks via Real-Time Feedback Control
-
Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
J. A. Lewis
Center for Strategic and International Studies
[2002]
-
Anintegrative study of information systems security effectiveness
-
A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
J. Mirkovic
ACM SIGCOMM Computer Communication Review 34 (2) 39 ~ 53
[2004]
-
A Practical Approach to Enterprise IT Security
S. Liu
IEEE IT Professional 3 (5) 35 ~ 42
[2001]
-
A Concept for Strategic Cyber Defense
W. Tirenin
Proc. of the MILCOM 1999 458 ~ 463
[1999]
-
2008 CSI Computer Crime and Security Survey
'
조직 정보 시스템 보안을 위한 총괄 전략 프레임워크'
의 유사주제(
) 논문