English  |  正體中文  |  简体中文  |  Items with full text/Total items : 60696/93562 (65%)
Visitors : 1054702      Online Users : 23
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/74414

    Title: 電子郵件稽核之研究
    Other Titles: A study of the e-mail audit
    Authors: 謝佳潤;Hsieh, Chia-Jun
    Contributors: 淡江大學資訊管理學系碩士在職專班
    黃明達;Hwang, Ming-Dar
    Keywords: 電子郵件稽核;稽核政策;過濾條件;稽核;E-Mail Audit;Audit Policy;Filter Condition
    Date: 2011
    Issue Date: 2011-12-28 18:34:54 (UTC+8)
    Abstract: 網際網路(Internet)的快速發展,加上無線行動裝置的普及,讓人們隨時隨地在任何時間都可以收發電子郵件(E-mail),突破地域與傳送的限制,在企業商務往來已經成為必要的工具。然而電子郵件快速便利,卻也帶來不可忽視的風險,電子郵件不再如過去單純的寄送,而是夾雜著大量的廣告、病毒以及釣魚(Phising)手法,企業疲於對抗來自於Internet的威脅,進而忽視因員工使用不當,造成企業機密資訊外洩,讓企業除了金錢上的損失,更有可能使形象受損。現今資訊管理不再單純化,而是必須隨著威脅型態的改變,而有因應的策略,更應容入稽核的思維。


    Allowing people to send or receive E-mails anytime and anywhere without restrictions in regions or transmission, the fast developed Internet and the popularized wireless mobile devices have become essential tools of commercial intercourse between enterprises. Despite rapidness and convenience, E-mails, which are not simply sent or received by users but comprising large number of ads, viruses, and phising tricks, bring Internet-related indispensable risks confronted by enterprises such as, due to employees’ misuse of E-mails neglected by an enterprise, exposure of trade secrets, monetary loss, and bad reputation. Nowadays, the information management, which, rather than being simple, is adjusted to deal with different types of threats, should incorporate precautionary measures and even audit mechanisms.

    The objectives of the study are to investigate application, level, and direction of the E-mail audit policy inside an enterprise, conditions and items to audit E-mails, and achievement with these conditions initiated according to the status of E-mails audited in enterprises. Additionally, the differences in the E-mail audit policies or filter types for multiple industries are also compared and referred to as references of instituting an industry’s E-mail audit policy.

    It can be found in this study that the equipment for the purpose of auditing an enterprise’s E-mails is not sufficiently employed during performance of audit. Based on analyses for different types of industries, the electronic industry proactively makes use of the E-mail audits in contrast to the conventional industry with fewer audits performed. In consideration of the audit policies not substantially communicated between enterprises, we analyzed some enterprises’ E-mail audit conditions taken as other enterprises’ references to perform or develop their own E-mail audit policies, which allow the most applicable category for E-mail audit to be interpreted by any industry which intends to introduce the E-mail audit.
    Appears in Collections:[Graduate Institute & Department of Information Management] Thesis

    Files in This Item:

    File SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback