透過您的圖書館登入
IP:3.129.13.201
  • 學位論文

以適應性結構化理論觀點探討組織導入ISMS之關鍵成功因素與互補性資產

A Study on The Critical Success Factors and Complementary Assets of ISMS from the Perspective of Adaptive Structure Theory

指導教授 : 吳錦波

摘要


近年來全球資訊安全事件頻傳,犯罪手法不斷翻新,造成的損害影響甚鉅。為保護企業持續營運,企業領導人負有實施資訊安全之責,而國際認證的資訊安全管理系統ISMS( Information Security Management Systems ),便是一套能有效控制與持續運作的系統化管理機制。本研究目的在瞭解組織導入資訊安全管理系統時,組織需要有那些配套措施或必備的條件才能使制度發揮其功效。本研究採用了質性研究的訪談法,以適應性結構化理論角度,選取四間公司為研究對象,從實際導入ISMS 的經驗中,發現組織應具備哪些互補性資產與關鍵成功因素。研究結果不但呈現導入期間的困難與解決方式。

並列摘要


In recent years, the number of cyber (information security) attacks has been increasing all over the world and such attacks are constantly evolving and cause huge damage. In order to protect the operation of enterprises, the enterprise leaders have the responsibility to take information security measures. The internationally certified ISMS (Information Security Management Systems) is a systematic management mechanism for achieving effective control and continuous operation. The purpose of this study is to understand, when introducing ISMS, what supporting measures or conditions the organization will need in order to effectively implement the system. This study is based on qualitative research carried out by interviews, and from the aspect of the adaptive structural theory, four companies have been chosen as the study objects. This study is to find what complementary assets and critical success factors are required for the organization from the experience of actually introducing ISMS. The results show the difficulties during introduction and the solutions.

參考文獻


2. 王貴民, 韓慧林, 陳建任, 李承漢, 陳鼎元, & 洪全緯. (2010). 國防資訊安全管理系統之導入專案管理模式建構. 國防雜誌 National Defense Journal, 25(6), 24-36. doi:10.6326/NDJ.2010.25(6).3
4. 田效文(Shiaw-Wen Tien), 陳秀玲(Hsiu-Lin Chen), 黃文聰(Wen-Tsung Hwang), & 顏榮甫(Rong-Fu Yan). (2011). 中小企業資訊安全診斷之個案研究. 馬偕學報, (8), 19-49. Retrieved from AiritiLibrary database.
12. 林宜隆(I-Long Lin), 謝宗翰(Tsung-Han Hsieh), 黃正宇(Cheng-Yu Huang), & 廖女清(Neu-Ching Liao). (2014). Iso 27002與iso 27799之比較分析―以醫療機構為例. 管理資訊計算, 3(2), 331-344. doi:10.6285/MIC.3(2).23
16. 林金定、嚴嘉櫥與陳美花(2005)。質性研究方法:訪談模式與實施步驟分析,身心障礙研究,3(2),122-136。
18. 胡瑞賢. (2010). 資訊安全風險評估模式之研究―以某半導體封裝公司為例(下). 電腦稽核, (22), 1-22. Retrieved from AiritiLibrary database.

延伸閱讀