淡江大學機構典藏:Item 987654321/74414
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62797/95867 (66%)
Visitors : 3742224      Online Users : 515
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/74414


    Title: 電子郵件稽核之研究
    Other Titles: A study of the e-mail audit
    Authors: 謝佳潤;Hsieh, Chia-Jun
    Contributors: 淡江大學資訊管理學系碩士在職專班
    黃明達;Hwang, Ming-Dar
    Keywords: 電子郵件稽核;稽核政策;過濾條件;稽核;E-Mail Audit;Audit Policy;Filter Condition
    Date: 2011
    Issue Date: 2011-12-28 18:34:54 (UTC+8)
    Abstract: 網際網路(Internet)的快速發展,加上無線行動裝置的普及,讓人們隨時隨地在任何時間都可以收發電子郵件(E-mail),突破地域與傳送的限制,在企業商務往來已經成為必要的工具。然而電子郵件快速便利,卻也帶來不可忽視的風險,電子郵件不再如過去單純的寄送,而是夾雜著大量的廣告、病毒以及釣魚(Phising)手法,企業疲於對抗來自於Internet的威脅,進而忽視因員工使用不當,造成企業機密資訊外洩,讓企業除了金錢上的損失,更有可能使形象受損。現今資訊管理不再單純化,而是必須隨著威脅型態的改變,而有因應的策略,更應容入稽核的思維。

    本論文研究目的為透過企業電子郵件稽核使用現況,了解在企業環境裡電子郵件稽核政策的運用,並深入了解企業對電子郵件稽核使用程度及方向,是以何種電子郵件稽核條件進行稽核,其中又以哪些電子郵件稽核的項目為主,而所制定的電子郵件稽核條件是否有落實;比較產業類型的不同,電子郵件稽核政策是否也有所差異,過濾的型態是否不同,研究結果可供各產業制定電子郵件稽核政策的參照。

    從研究結果中發現企業雖有使用電子郵件稽核設備,但在執行及使用上仍有不足之處。而以產業類型分析,電子產業在電子郵件稽核運用上最為積極,而傳統產業是較未能落實;企業間難以交流彼此的稽核政策,所以本研究分析出的8種產業類別35家企業電子郵件稽核條件,可做為企業執行或建立電子郵件稽核的參考或依據,讓計畫導入電子郵件稽核的產業,了解到目前最適合的電子郵件稽核的類型。
    Allowing people to send or receive E-mails anytime and anywhere without restrictions in regions or transmission, the fast developed Internet and the popularized wireless mobile devices have become essential tools of commercial intercourse between enterprises. Despite rapidness and convenience, E-mails, which are not simply sent or received by users but comprising large number of ads, viruses, and phising tricks, bring Internet-related indispensable risks confronted by enterprises such as, due to employees’ misuse of E-mails neglected by an enterprise, exposure of trade secrets, monetary loss, and bad reputation. Nowadays, the information management, which, rather than being simple, is adjusted to deal with different types of threats, should incorporate precautionary measures and even audit mechanisms.

    The objectives of the study are to investigate application, level, and direction of the E-mail audit policy inside an enterprise, conditions and items to audit E-mails, and achievement with these conditions initiated according to the status of E-mails audited in enterprises. Additionally, the differences in the E-mail audit policies or filter types for multiple industries are also compared and referred to as references of instituting an industry’s E-mail audit policy.

    It can be found in this study that the equipment for the purpose of auditing an enterprise’s E-mails is not sufficiently employed during performance of audit. Based on analyses for different types of industries, the electronic industry proactively makes use of the E-mail audits in contrast to the conventional industry with fewer audits performed. In consideration of the audit policies not substantially communicated between enterprises, we analyzed some enterprises’ E-mail audit conditions taken as other enterprises’ references to perform or develop their own E-mail audit policies, which allow the most applicable category for E-mail audit to be interpreted by any industry which intends to introduce the E-mail audit.
    Appears in Collections:[Graduate Institute & Department of Information Management] Thesis

    Files in This Item:

    File SizeFormat
    index.html0KbHTML234View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback