透過您的圖書館登入
IP:3.17.6.75
  • 期刊

企業之資訊安全策略與其產業別及資訊化程度關係探討

Information Security Strategy to Businesses in Different Sectors and Computerization Levels

摘要


資訊系統的複雜化雖然為企業帶來可觀的效益,同時也帶來風險。有鑑於此,許多學者紛紛提出維護企業資訊安全的方法及相對因應策略(如Rainer et al. 1991;Straub & Welke 1998;von Solms et al. 1994;Ølnes 1994)。這些理論與方法雖然提供企業不少資訊安全解決之道,但多數未考慮企業自身屬性,如產業別或資訊化程度等,在擬定資訊安全策略上之重要性。然而,針對企業屬性適當地制定經營策略,是企業經營上不可避免的要點。本研究目的即在探討不同產業型態及資訊化程度之企業對資訊風險的看法,包括資訊風險對目前及未來產業之可能威脅,以及這些產業所採取之相對防護策略與措施等,以瞭解台灣不同產業間在擬定資訊安全策略上之適當性。

並列摘要


As businesses become increasingly dependent on information systems for strategic operations, the issues of information security emerge. Many MIS researchers (e.g., Rainer et al. 1991; Straub & Welke 1998; Von Solms et al. 1994; and Ølnes 1994) have proposed theories and practices against information risks. While useful solutions were provided, seldom have considered associations of business information security strategy with the industrial sector and the computerization level. The purpose of this paper is to construct the feasible information security strategy that identify the protections required to avoid the information risks. Through comparing the perceived seriousness of the potential information risks with the degree of preparation against them, and with the perceived trend of information risk in the future, main information risks are inferred for businesses in different sectors and computerization levels. Organizations must become aware of these critical areas and ensure that the appropriate security measures are implemented to reduce the possibility of loss.

參考文獻


Aivazian, C.(1998).Information Security during Organizational Transitions.Information strategy: the executive's journal.14(3),21-27.
Birch, D. G.W.,McEvoy, N. A.(1992).Risk analysis for Information Systems.Journal of Information Technology.7,44-53.
BSI(2002).(BS7799-2:2002 British Standards for benchmarking Information Security Management Systems (ISMS)).
Earl, M. J.(1989).Management Strategies for Information Technology.Prentice Hall, Hemel Hempstead.
Eloff, M.M.,von Solms, S.H.(2000).Information Security Management: A Hierachical Framework for Various Approaches.Computer & Security.19,243-256.

被引用紀錄


李維祚(2017)。以適應性結構化理論觀點探討組織導入ISMS之關鍵成功因素與互補性資產〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2017.00561
林昱任(2015)。資訊管理化程度與內部稽核品質對學校營運風險之影響-以南部某私立大學為例〔碩士論文,長榮大學〕。華藝線上圖書館。https://doi.org/10.6833/CJCU.2015.00186
宋詩夫(2015)。企業策略、製造策略、行銷策略及資訊系統策略之策略配適對企業績效影響〔博士論文,義守大學〕。華藝線上圖書館。https://doi.org/10.6343/ISU.2015.00344
陳建佐(2009)。農會資訊化程度影響因素之空間探索分析〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2009.02071
施碧蘭(2007)。建置ISMS認知與實施之研究-以某署立醫院為例〔碩士論文,元智大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0009-2905200709210100

延伸閱讀