淡江大學機構典藏:Item 987654321/74414
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 62805/95882 (66%)
造访人次 : 3987170      在线人数 : 709
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/74414


    题名: 電子郵件稽核之研究
    其它题名: A study of the e-mail audit
    作者: 謝佳潤;Hsieh, Chia-Jun
    贡献者: 淡江大學資訊管理學系碩士在職專班
    黃明達;Hwang, Ming-Dar
    关键词: 電子郵件稽核;稽核政策;過濾條件;稽核;E-Mail Audit;Audit Policy;Filter Condition
    日期: 2011
    上传时间: 2011-12-28 18:34:54 (UTC+8)
    摘要: 網際網路(Internet)的快速發展,加上無線行動裝置的普及,讓人們隨時隨地在任何時間都可以收發電子郵件(E-mail),突破地域與傳送的限制,在企業商務往來已經成為必要的工具。然而電子郵件快速便利,卻也帶來不可忽視的風險,電子郵件不再如過去單純的寄送,而是夾雜著大量的廣告、病毒以及釣魚(Phising)手法,企業疲於對抗來自於Internet的威脅,進而忽視因員工使用不當,造成企業機密資訊外洩,讓企業除了金錢上的損失,更有可能使形象受損。現今資訊管理不再單純化,而是必須隨著威脅型態的改變,而有因應的策略,更應容入稽核的思維。

    本論文研究目的為透過企業電子郵件稽核使用現況,了解在企業環境裡電子郵件稽核政策的運用,並深入了解企業對電子郵件稽核使用程度及方向,是以何種電子郵件稽核條件進行稽核,其中又以哪些電子郵件稽核的項目為主,而所制定的電子郵件稽核條件是否有落實;比較產業類型的不同,電子郵件稽核政策是否也有所差異,過濾的型態是否不同,研究結果可供各產業制定電子郵件稽核政策的參照。

    從研究結果中發現企業雖有使用電子郵件稽核設備,但在執行及使用上仍有不足之處。而以產業類型分析,電子產業在電子郵件稽核運用上最為積極,而傳統產業是較未能落實;企業間難以交流彼此的稽核政策,所以本研究分析出的8種產業類別35家企業電子郵件稽核條件,可做為企業執行或建立電子郵件稽核的參考或依據,讓計畫導入電子郵件稽核的產業,了解到目前最適合的電子郵件稽核的類型。
    Allowing people to send or receive E-mails anytime and anywhere without restrictions in regions or transmission, the fast developed Internet and the popularized wireless mobile devices have become essential tools of commercial intercourse between enterprises. Despite rapidness and convenience, E-mails, which are not simply sent or received by users but comprising large number of ads, viruses, and phising tricks, bring Internet-related indispensable risks confronted by enterprises such as, due to employees’ misuse of E-mails neglected by an enterprise, exposure of trade secrets, monetary loss, and bad reputation. Nowadays, the information management, which, rather than being simple, is adjusted to deal with different types of threats, should incorporate precautionary measures and even audit mechanisms.

    The objectives of the study are to investigate application, level, and direction of the E-mail audit policy inside an enterprise, conditions and items to audit E-mails, and achievement with these conditions initiated according to the status of E-mails audited in enterprises. Additionally, the differences in the E-mail audit policies or filter types for multiple industries are also compared and referred to as references of instituting an industry’s E-mail audit policy.

    It can be found in this study that the equipment for the purpose of auditing an enterprise’s E-mails is not sufficiently employed during performance of audit. Based on analyses for different types of industries, the electronic industry proactively makes use of the E-mail audits in contrast to the conventional industry with fewer audits performed. In consideration of the audit policies not substantially communicated between enterprises, we analyzed some enterprises’ E-mail audit conditions taken as other enterprises’ references to perform or develop their own E-mail audit policies, which allow the most applicable category for E-mail audit to be interpreted by any industry which intends to introduce the E-mail audit.
    显示于类别:[資訊管理學系暨研究所] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML234检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈