조직 정보 시스템 보안을 위한 총괄 전략 프레임워크

박상서 2009년
논문상세정보
' 조직 정보 시스템 보안을 위한 총괄 전략 프레임워크' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 프로그래밍, 프로그램, 데이터
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
24 1

4.2%

' 조직 정보 시스템 보안을 위한 총괄 전략 프레임워크' 의 참고문헌

  • 조직 차원의 정보보안 전략의 개념
    박상서 정보*보안논문지 7 (3) 15 ~ 24 [2007]
  • 정보보호 중기 종합계획
  • Understanding Concepts in the Defense in Depth Strategy
    C. L. Smith Proc. of the IEEE 37th International Carnahan Conference on Security Technology 8 ~ 16 [2003]
  • The Sources of Military Doctrine: France, Britain, and the Germany Between the World Wars
    B. R. Posen Cornell University Press [1984]
  • The Renaissance of Security Studies
    S. M. Walt International Studies Quarterly 35 (2) 211 ~ 239 [1991]
  • The Need for In-Depth Cyber Defence Progrmmes in Business Information Warfare Environments
    S. Edwards Proc. of the 2nd Australian Information Warfare and Security Conf 56 ~ 63 [2001]
  • The National Strategy to Secure Cyberspace
  • The Management of Strategy
    M. E. Salveson Long Range Planning 19 ~ 26 [1974]
  • The Forgotten Dimensions of Strategy
    M. Howard Foreign Affairs 57 (5) 975 ~ 986 [1979]
  • The Critical Success Factor Method:Establishing a Foundation for Enterprise Security Management
  • The Concept of Corporate Strategy, 3rd ed
    K. R. Andrews Richard D Irwin [1987]
  • Strategy and Structure
    Chendeler MIT Press [1962]
  • Strategy
  • Strategic Approach to Information Security in Organizations
    S. Park T.Ruighaver Proc. of the 2008 IEEE International Conference on Information Science and Security(ICISS 2008) 26 ~ 31 [2008]
  • Static Analysis for Security
    B. Chess IEEE Security and Privacy 2 (6) 76 ~ 79 [2004]
  • Social Defense Strategy:The Role of Technology
    B. Martin Journal of Peace Research 36 (5) 535 ~ 552 [1999]
  • So What is Strategy?
    R. Evered Long Range Planning 16 (3) 57 ~ 72 [1983]
  • Security in Mobile Ad Hoc Networks:Challenges and Solutions
    H. Yang IEEE Wireless Communications 11 (1) 38 ~ 47 [2004]
  • SALSA:A Method for Developing the Enterprise Security Architecture and Strategy
    J. Sherwood Computers and Security 15 501 ~ 506 [1996]
  • Report to the President, Cyber Security:A Crisis of Prioritization
  • Reflecting on 20 SEC Conferences
    R. A. Botha Computers and Security 25 (6) 247 ~ 256 [2006]
  • Patterns in Strategy Formation
    Mintzberg Management Science 24 (9) 934 ~ 948 [1978]
  • Overview of Cyber Security:A Crisis of Prioritization
    S. Landau IEEE Security and Privacy 3 (3) 9 ~ 11 [2005]
  • Organizational Context and Information SystemsSuccess : A Contingency Approach
    Raymond Journal of Management Information Systems 6 (4) 5 ~ 20 [1990]
  • Organisational Security Culture:Extending the End-user Perspective
    A. B. Ruighaver Computers and Security 26 56 ~ 62 [2007]
  • On War
  • Offensive versus Defensive:Military Strategy and Alternative Defence
    W. Agrell Journal of Peace Research 24 (1) 75 ~ 85 [1987]
  • OECD Guidelines for the Security of Information Systems and Networks:Towards a Culture of Security
    OECD [2002]
  • Moving Beyond Compliance: Ernst and Young’s 2008 Global Information Security Survey
    Ernst Ernst and Young [2008]
  • Military Strategy and the Outbreak of International Conflict:Quantitative Empirical Tests, 1903-1992
    D. Reiter The Journal of Conflict Resolution 43 (3) 366 ~ 387 [1992]
  • Managing the Risk of Organizational Accidents
    J. Reason Ashgate Publishing Ltd [1997]
  • Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness
    J. M. Torres Proc. of the ISC 2006. LNCS 4176 530 ~ 545 [2006]
  • Managed Security in the Enterprise(U.S. Enterprise), Symantec, Mar
    Symantec [2009]
  • Least Effort Strategies for Cybersecurity
    S. P. Gorman Proc. of the The Critical Infrastructure Project Workshop I:Working Papers 1 ~ 14 [2003]
  • Inhibiting Enterprise: Fraud and Online Crime Against Small Business
    FSB Federation of Small Businesses [2009]
  • Information Systems Security: Management Success Factors
    C. C. Wood Computers and Security 6 314 ~ 320 [1987]
  • Information Security-The Third Wave?
    B. V. Solms Computers and Security 19 615 ~ 620 [2000]
  • Information Security-The Fourth Wave
    B. V. Solms Computers and Security 25 165 ~ 168 [2006]
  • Information Security Handbook A Guide for Managers, Recommendations of the National Institute of Standards and Technology
    P. Bowen [2006]
  • Guide to Malware Incident Prevention and Handling, Recommendations of the National Institute of Standards and Technology
    P. Mel [2005]
  • From Preponderance to Offshore Balancing:America’s Future Grand Strategy
    C. Layne International Security 22 (1) 86 ~ 124 [1997]
  • Exploring Organisational Security Culture:Developing a Comprehensive Research Model
    P. A. Chia Proc. of the IS ONE World Conference [2002]
  • Evaluating Information Assurance Strategies
    J. T. Hamill Decision Support Systems 39 463 ~ 484 [2005]
  • Effective IS security: An empirical study
    Straub Information Systems Research 1 (3) 255 ~ 276 [1990]
  • Development of Security Policies
    J. ?lnes J.Olnes Computers and Security 13 (8) 628 ~ 636 [1994]
  • Determinants of Military Strategy, 1903-1994:A Quantitative Empirical Test
    D. Reiter International Studies Quarterly 43 (2) 363 ~ 387 [1994]
  • Defensive Information Warfare
    D. S. Alberts Press Book [1996]
  • Cyberwar Strategy and Tactics
    L. S. Tinnel Proc. of the 2002 IEEE Workshop on Information Assurance, United States Military Academy 228 ~ 234 [2002]
  • Cyber Defense:Art to Science
    O. S. Saydjari Communications of the ACM 47 (3) 53 ~ 57 [2004]
  • Coping with Systems Risk: Security Planning Models for Management Decision Making
    Straub MIS Quarterly 22 (4) 441 ~ 469 [1998]
  • Computer security management>
    D. B. Parker K. A. Forcht Reston Publishing [1981]
  • Computer Security in the Real World
    B. W. Lampson Computer 37 (6) 37 ~ 46 [2004]
  • Computer Security Incident Handling Guide, NIST Special Publication 800-61
    T. Grance [2004]
  • Autonomic Defense:Thwarting Automated Attacks via Real-Time Feedback Control
    D. Armstrong Complexity 9 (2) 41 ~ 48 [2004]
  • Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
    J. A. Lewis Center for Strategic and International Studies [2002]
  • Anintegrative study of information systems security effectiveness
    A. Kankanhalli Kankanhalli Kankanhalli, A. International Journal of Information Management 23 139 ~ 154 [2003]
  • A Taxonomy of DDoS Attack and DDoS Defense Mechanisms
    J. Mirkovic ACM SIGCOMM Computer Communication Review 34 (2) 39 ~ 53 [2004]
  • A Practical Approach to Enterprise IT Security
    S. Liu IEEE IT Professional 3 (5) 35 ~ 42 [2001]
  • A Concept for Strategic Cyber Defense
    W. Tirenin Proc. of the MILCOM 1999 458 ~ 463 [1999]
  • 2008 CSI Computer Crime and Security Survey
    R. Richardson Computer Security Institute [2008]