English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62861/95882 (66%)
Visitors : 4192422      Online Users : 965
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/102377


    Title: 系統開發生命週期結合資訊安全機制之研究
    Other Titles: The study of information security management mechanism in system development life cycle
    Authors: 呂品慧;Lu, Pin-Hui
    Contributors: 淡江大學資訊管理學系碩士班
    游佳萍
    Keywords: 資訊安全;系統開發生命週期;紮根理論;Information security;System development life cycle;Grounded Theory
    Date: 2014
    Issue Date: 2015-05-04 09:54:16 (UTC+8)
    Abstract: 本研究使用質性研究以及紮跟理論的三種編碼方法,希望從中探究資訊系統開發過程應注意之資訊安全議題。在研究結果中發現,第一,組織對於不同資訊安全議題,其所注重的程度也不盡相同。第二,各種不同的資訊安全議題,也會互相影響。第三,一個資訊安全議題,可能在數個不同的系統開發階段中受到重視,組織在進行資訊系統開發時,應該注重這些在不同開發階段都會引起討論的議題。
      基於本研究的結果,第一,我們建議資訊系統開發的管理者,在系統開發的階段中,應該更重視資訊安全的議題,以建立更完善的資訊安全管理機制。第二,各個資訊安全議題之間可能互相影響。因此組織在進行系統開發時,應該注意到許多的資訊安全議題都是會互相影響的。最後,組織所看重的資訊安全議題,會因不同的系統開發階段,而有所區別。也可以讓組織更加注意到,在多個系統開發階段中都會引起重視的資訊安全議題。
    This research used qualitative research and grounded theory, to explore information security issues in the information system development process. In this study, there are several findings. First, the organizations identify various information security issues to implement the information security mechanisms. Second, there are strong connections between security issues. Third, several critical security issue are addressed in the system development process.

    Based on our findings, first, we suggest the information system managers have to establish robust information security mechanism to implement high quality services. Second, organizations should focus on different information security issues in different system development processes, because there are significant mutual operations between several critical security mechanisms. Finally, the managers have to focus on key information security mechanism from the initial to the end of the system development phases.
    Appears in Collections:[Graduate Institute & Department of Information Management] Thesis

    Files in This Item:

    File SizeFormat
    index.html0KbHTML118View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback