透過您的圖書館登入
IP:3.135.246.193

並列摘要


Risk management has become an important issue in the information security area. This study proposes a Semi-Markov chain model to manage the information security risk. When the state information is not recognized as a normal state, the model can send a warning signal to the manager. A simulated model was used to validate the semi-Markov chain model.

參考文獻


R.K.J.R. Rainer, C.A. Snyder, and H.H. Carr, Risk analysis for information technology. Journal of Management Information Systems, 8 (1), p129-147, 1991.
The Committee on National Security Systems (CNSS), CNSS Instruction, No. 4009, 2003. Retrieved October 21, 2010, from http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf.
Symantec, U.S. Information Security Law, Part Four. Retrieved October 21, 2010, from http://www.symantec.com/connect/articles/us-information-security-law-part-four
M. Bishop, Computer Security: Art and Science. Boston, MA: Addison-Wesley, 2003.
M. Keil, A. Tiwana, and A. Bush, Reconciling user and project manager perceptions of IT project risk: a Delphi study. Information Systems Journal, 12(2), p103-119, 2002.

被引用紀錄


吳培綺(2012)。光學眼鏡品牌形象、服務品質和顧客滿意對再購意願關係之研究-以Agnes b.為例〔碩士論文,長榮大學〕。華藝線上圖書館。https://doi.org/10.6833/CJCU.2012.00141

延伸閱讀