摘要(英) |
Information security management is non-ignorable management topic, and the key spirit is to identify important information property in organization and the threat been faced, then under effect resource arrangement plan reasonable control policy, and reduce risk to acceptable range. This is an information security risk management process, key point of management should focus on protection of secrete information in organization,instead of all information access channel, because this will cause enterprise waste cost and lost focus as well. Yearly most of information security events from international and domestic are due to lack of above information security risk management mechanism.
When enterprise during expansion business size, need through information security and management policy to protect the Intelligence Property and secret information, And information user also need security concept to well use company resource, by through regulation, system and authority control to manage and use company information property effetely.
This research based on BS7799 international security spec, and choose printed circuit board A company as case study, based on case study company information, high level management interview and historical experience, integrate all of information then refer to international and domestic articles, and also from company operation status, information security problem, influence of impact, to show importance of information security by effectiveness of measures and concrete results from improvements and know the difference between before and after of information security structure setup.
Information security is continue operating plan, even lots of enterprise already setup information security policy but still can not avoid information security events happens, the reason is ignore the importance of security management and did not update continually. In view of this, the study recommends that companies need to continue finding out and feedback areas need to improve, and continue to update information security plan based on requirement at different phase of information security.
|
參考文獻 |
一、中文部份
1. MIC研究報告,全球PCB產業結構解析,2013。
2. 史振忠,資訊安全風險評估與管理之研究,中原大學資訊管理研究所碩士論文,2006。
3. 呂伯雲,電腦稽核專業倫理規範之研究,國立中央大學資訊管理學系研究所博士論文,2012。
4. 林保祥,資訊人員安全管理對企業資訊系統安全之影響,國立中央大學資訊管理學系研究所碩士論文,2009。
5. 林東峰,企業資訊安全控管決策之研究-從組織決策理論觀點探討,國立中央大學資訊管理學系研究所博士論文,2003。
6. 金天翼,以個案研究法探討組織ISMS之導入,國立中央大學資訊管理學系研究所碩士論文,2011。
7. 洪國興、季延平、趙榮耀,影響資訊安全關鍵因素之研究,台北。
8. 黃亮宇,資訊安全規劃與管理,台北,松崗電腦圖書,1992。
9. 陳琦樺,台灣電子產業價值創造之研究,國立中山大學企業管理學系研究所碩士論文,2007。
10. 張芳珍,以BS7799落實資訊安全管理-管理類資訊資產份類與管控,國立中央大學資訊管理學系研究所碩士論文,2005。
11. 廖鴻圖、郭明煌、廖偉鵬、廖健興,建構資訊安全風險管理模式之個案研究,知識社群與系統發展研討會,2008。
12. 鄭信一,現代企業資訊安全之個案研究,銘傳大學管理科學研究所碩士論文,1999。
13. 蔡永銘,現代安全管理,台北:揚智文化事業公司,2003。
14. 謝清佳、吳琮璠,資訊管理-理論與實務,台北,1999。
15. 蘇建源、江琬瑂、阮金聲,資訊安全政策實施對資訊安全文化與資訊安全有效性影響之研究,國立中正大學資訊管理學系,資訊管理學報第十七卷第四期。
二、英文部份
1. Allen, B.“Danger Ahead! Safeguard Your Computer,"Harvard Business Review (46:6),1968, pp. 97-101.
2. Baskerville, R., and Siponen, M.“An Information Security Meta-Policy for Emergent Organizations,"Logistics Information Management (15:5), 2002, pp. 337-346.
3. Flynn, N. L. The E-Policy Handbook: Designing and Implementing Effective E-Mail,Internet, and Software Policies, American Management Association, New York, 2001.
4. Ford, R. C., and Richardson, W. D.“Ethical Decision Making: A Review of the Empirical Literature,"Journal of business ethics (13:3), 1994, pp. 205-221.
5. Gaunt, N.“Installing an Appropriate Information Security Policy,"International Journal of Medical Informatics (49:1), 1998, pp. 131-134.
6. Gupta, Y. P.“The Chief Executive Officer and the Chief Information Officer: The Strategic Partnership,"Journal of Information Technology (6:3-4), 1991, pp. 128-139.
7. Hong, K.S., Chi, Y.P., Chao, L.R., and Tang, J.H.“An Empirical Study of Information Security Policy on Information Security Elevation in Taiwan,"Information Management & Computer Security (14:2), 2006, pp. 104-115.
8. Horrocks, I.“Security Training: Education for an Emerging Profession?"Computers & Security (20:3), 2001, pp. 219-226.
9. Karyda, M., Kiountouzis, E., and Kokolakis, S.“Information Systems Security Policies: A Contextual Perspective,"Computers & Security (24:3), 2005, pp. 246-260.
10. Loe, T. W., Ferrell, L., and Mansfield, P.“A Review of Empirical Studies Assessing Ethical Decision Making in Business,"Journal of business ethics (25:3), 2000, pp. 185-204.
11. Rees, J., Bandyopadhyay, S., and Spafford, E. H.“PFIRES: A Policy Framework for Information Security,"Communications of the ACM (46:7), 2003, pp. 101-106.
12. Siponen, M. T.“A Conceptual Foundation for Organizational Information Security Awareness,"Information Management & Computer Security (8:1), 2000, pp. 31-41.
13. Straub, D. W., and Welke, R. J.“Coping with Systems Risk: Security Planning Models for Management Decision Making,"MIS Quarterly (22:4), 1998, pp. 441-469.
14. Straub, D. W.“Effective IS Security: An Empirical Study,"Information Systems Research(1:3), 1990, pp. 255-276.
15. Thomson, K. L., and Von Solms, R.“Information Security Obedience: A
Definition,"Computer & Security (24:1), 2005, pp. 69-75.
16. Tudor, J. K. Information Security Architecture: An Integrated Approach to Security in the Organization, CRC Press, Boca Raton, 2001.
17. Wood, C. C.“An Unappreciated Reason Why Information Security Policies
Fail,"Computer Fraud & Security (2000:10), 2000, pp. 13-14.
18. Wood, C. C.“Writing InfoSec Policies,"Computers & Security (14:8), 1995, pp. 667-674.
三、參考網址
1.Information Security資安人科技網,http://www.informationsecurity.com.tw/
2.凌群電腦,http://www.syscom.com.tw/
3.DIGITIMES中文網,http://www.digitimes.com.tw/
4.北京英倫凱悅管理諮詢有限公司,http://www.iso27001.org.cn/
5.財團法人資訊工業策進會-資安科技研究所,http://www.iii.org.tw/
6.行政院國家資通安全會報技術服務中心,http://www.icst.org.tw/
7.華藝線上圖書館,http://www.airitilibrary.com/
8.Netadmin網管人,http://www.netadmin.com.tw/
9.台灣碩博士論文知識加值系統,http://ndltd.ncl.edu.tw/
|