English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 62822/95882 (66%)
造访人次 : 4017931      在线人数 : 773
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/45518


    题名: An empirical study of information security policy on information security elevation in Taiwan
    作者: Hong, Kwo-shing;Chi, Yen-ping;趙榮耀;Chow, Louis R.;Tang, Jih-hsing
    贡献者: 淡江大學資訊工程學系
    关键词: Data security;Security products;Critical path analysis
    日期: 2006-01-01
    上传时间: 2010-03-26 19:27:23 (UTC+8)
    出版者: Emerald
    摘要: Purpose
    – With the popularity of e‐commerce, information security is vital to most organizations. For managers, building and implementing an information security policy (ISP) has long been assumed to be an effective managerial measure to elevate an organization's security level. This paper attempts to investigate the dominant factors for an organization to build an ISP, and whether an ISP may elevate an organization's security level?

    Design/methodology/approach
    – A survey was designed and the data were collected from 165 chief information officers in Taiwan.

    Findings
    – The empirical results show that some organizational characteristics (business type and MIS/IS department size) might be good predictors for the ISP adoption and that the functions, contents, implementation and procedures of an ISP may significantly contribute to managers' perceived elevation of information security.

    Practical implications
    – Building or adopting an ISP is examined empirically to be an effective managerial measure to elevate its security level in Taiwan, and that the building of an information security should focus on the comprehensiveness of its contents, procedures and implementation items, rather than on the documents only.

    Originality/value
    – Few empirical studies have been conducted so far to examine the effectiveness of an ISP, thus the value of this paper is high.
    關聯: Information Management & Computer Security 14(2), pp.104-115
    DOI: 10.1108/09685220610655861
    显示于类别:[資訊工程學系暨研究所] 期刊論文

    文件中的档案:

    档案 大小格式浏览次数
    0KbUnknown273检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈