Advanced Information Security Management Evaluation System
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jo, Heasuk | - |
dc.contributor.author | Kim, Seungjoo | - |
dc.contributor.author | Won, Dongho | - |
dc.date.accessioned | 2021-09-07T11:29:04Z | - |
dc.date.available | 2021-09-07T11:29:04Z | - |
dc.date.created | 2021-06-14 | - |
dc.date.issued | 2011-06-28 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/112208 | - |
dc.description.abstract | Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | KSII-KOR SOC INTERNET INFORMATION | - |
dc.title | Advanced Information Security Management Evaluation System | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Seungjoo | - |
dc.identifier.doi | 10.3837/tiis.2011.06.006 | - |
dc.identifier.scopusid | 2-s2.0-84863011748 | - |
dc.identifier.wosid | 000296086800006 | - |
dc.identifier.bibliographicCitation | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.5, no.6, pp.1192 - 1213 | - |
dc.relation.isPartOf | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.title | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.volume | 5 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 1192 | - |
dc.citation.endPage | 1213 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART001634369 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.description.journalRegisteredClass | other | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Information security management systems (ISMSs) | - |
dc.subject.keywordAuthor | information security evaluation | - |
dc.subject.keywordAuthor | information security check | - |
dc.subject.keywordAuthor | information security evaluation process | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.