English  |  正體中文  |  简体中文  |  Items with full text/Total items : 60868/93650 (65%)
Visitors : 1147246      Online Users : 12
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/33989

    Title: 我國國軍資訊安全政策探討:危機管理觀點
    Other Titles: National armed forces information security policy discuss: crisis administers point of view
    Authors: 楊世平;Yang, Shih-ping
    Contributors: 淡江大學公共行政學系公共政策碩士在職專班
    陳恆鈞;Chen, Hen-chin
    Keywords: 資訊;資訊安全;危機;危機管理;Information;Information security;Crisis;crisis management.
    Date: 2008
    Issue Date: 2010-01-11 04:44:55 (UTC+8)
    Abstract: 中國諺語:「水能載舟、亦能覆舟」。電腦資訊時代為組織帶來處理事務的方便性,但也同時遭受資訊安全的威脅與侵害。因此,在推動資訊安全工作的前題下,亟需一套符合組織目標的資訊安全政策,以作為組織人員所共同遵守之依規。由此觀之,資訊安全政策是資訊安全管理的基礎。
    Just as a Chinese proverb goes that “the water that bears the boat is the same that swallows it up”, an era of computer information not only brings the convenience of dealing with the matters for an organization, but it also undergoes the threat and infringement of information security in the meantime. Therefore, a set of information security policy that meets the organizational objective is required while driving information security tasks. From this perspective, information security policy is the fundamental basis of information security management.
    Hence, this research is mainly to plore the current status of information security execution for national army from the perspective of “Public Policy” and reviews the obstacle of policy implementation from the viewpoint of “Crisis Theory”. It is expected that a potential crisis factor to be found via academic discussion with proper policy proposed.
    Based on the above point, this research is preliminarily to establish issues via a qualitative research method, to accomplish the research focuses of each individual stages step by step, to attain the purpose of being focused on research.The proposed items are as following : (1) Establish computer database feedback system and enhance the users’ convenience; (2) Cases were segmented by importance to strengthen the depth of defense of information security;(3) Enhance the level of director’s support to bring about the attention of unit personnel; (4) A self control of the PC hardware/software of the national army to prevent the status of “business processed at home” from happening. Consequencely how to enhance the safety and convenience on the information of the national army is the main job foday.
    Appears in Collections:[公共行政學系暨研究所] 學位論文

    Files in This Item:

    File SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback