Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Advanced Information Security Management Evaluation System

Full metadata record
DC Field Value Language
dc.contributor.authorJo, Heasuk-
dc.contributor.authorKim, Seungjoo-
dc.contributor.authorWon, Dongho-
dc.date.accessioned2021-09-07T11:29:04Z-
dc.date.available2021-09-07T11:29:04Z-
dc.date.created2021-06-14-
dc.date.issued2011-06-28-
dc.identifier.issn1976-7277-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/112208-
dc.description.abstractInformation security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherKSII-KOR SOC INTERNET INFORMATION-
dc.titleAdvanced Information Security Management Evaluation System-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Seungjoo-
dc.identifier.doi10.3837/tiis.2011.06.006-
dc.identifier.scopusid2-s2.0-84863011748-
dc.identifier.wosid000296086800006-
dc.identifier.bibliographicCitationKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.5, no.6, pp.1192 - 1213-
dc.relation.isPartOfKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.titleKSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS-
dc.citation.volume5-
dc.citation.number6-
dc.citation.startPage1192-
dc.citation.endPage1213-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.identifier.kciidART001634369-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.description.journalRegisteredClassother-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorInformation security management systems (ISMSs)-
dc.subject.keywordAuthorinformation security evaluation-
dc.subject.keywordAuthorinformation security check-
dc.subject.keywordAuthorinformation security evaluation process-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Seung joo photo

Kim, Seung joo
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE