資訊安全評估準則層級結構之研究 | A Study of Hierarchical Structure of Information Security Valuation Criteria
<p>頁次:22-44</p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; mso-layout-grid-align: none;"><span style="font-size: small;"><span style="font-family: &quot;新細明體&quot;,&quot;ser...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
National Taiwan Normal University
2003-10-01
|
Series: | Tushuguanxue yu Zixun Kexue |
Online Access: | http://jlis.glis.ntnu.edu.tw/ojs/index.php/jlis/article/view/418 |
id |
doaj-82c7a3c040894e32988680186d40e358 |
---|---|
record_format |
Article |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
洪國興、季延平、趙榮耀 Kwo-Shing Hong、Yen-Ping Chi、 Louis R. Chao |
spellingShingle |
洪國興、季延平、趙榮耀 Kwo-Shing Hong、Yen-Ping Chi、 Louis R. Chao 資訊安全評估準則層級結構之研究 | A Study of Hierarchical Structure of Information Security Valuation Criteria Tushuguanxue yu Zixun Kexue |
author_facet |
洪國興、季延平、趙榮耀 Kwo-Shing Hong、Yen-Ping Chi、 Louis R. Chao |
author_sort |
洪國興、季延平、趙榮耀 Kwo-Shing Hong、Yen-Ping Chi、 Louis R. Chao |
title |
資訊安全評估準則層級結構之研究 | A Study of Hierarchical Structure of Information Security Valuation Criteria |
title_short |
資訊安全評估準則層級結構之研究 | A Study of Hierarchical Structure of Information Security Valuation Criteria |
title_full |
資訊安全評估準則層級結構之研究 | A Study of Hierarchical Structure of Information Security Valuation Criteria |
title_fullStr |
資訊安全評估準則層級結構之研究 | A Study of Hierarchical Structure of Information Security Valuation Criteria |
title_full_unstemmed |
資訊安全評估準則層級結構之研究 | A Study of Hierarchical Structure of Information Security Valuation Criteria |
title_sort |
資訊安全評估準則層級結構之研究 | a study of hierarchical structure of information security valuation criteria |
publisher |
National Taiwan Normal University |
series |
Tushuguanxue yu Zixun Kexue |
issn |
0363-3640 |
publishDate |
2003-10-01 |
description |
<p>頁次:22-44</p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; mso-layout-grid-align: none;"><span style="font-size: small;"><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">各種調查或研究均顯示,資訊安全事故的發生比例與其所造成的財務損失均不斷上升。美國</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">911</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">事件、台灣納莉颱風的水災、財金公司的舞弊案等,均顯示隨著資訊科技的快速發展,資訊系統使用者的範圍不斷擴大,組織對資訊系統依賴程度的提高,資訊安全因而日愈重要。但組織資訊安全如何評估?應考慮那些評估準則?尚乏實証研究。本研究以資訊安全管理「整合系統理論」(</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">Integrated System Theory</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">)為基礎,經由因素分</span></span><span style="font-size: small;"><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">析、名目群組技術(</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">Nominal Group Technique</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">)的程序,匯集專家意見,建構「資訊安全評估準則層級結構」,共有</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">9</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">個評估構面,</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">37</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">項評估準則,可作為組織規劃資訊安全策略之參考,亦可作為繼續發展「資訊安全多準則評估模式」(</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">Information Security Multiple Criteria Valuation Model</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">)的基礎,實為資訊安全管理實証研究的重要里程碑。</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; mso-layout-grid-align: none;"><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-size: small;"><span style="font-family: Times New Roman;">Most results of various investigations and studies have shown that the percentage of information security accidents occurred and the financial losses caused are increasing continuously. September 11 attacks in the U.S.A., floods of Nari typhoon and malfeasant cases of Financial Information Service Co., Ltd. in Taiwan all indicate that information security has being more important day by day as a result of fast development of information technology, increasing range of users and dependence of an organization on information system. How to evaluate information security of an organization and what valuation criteria should be considered still lack of empirical studies. On the basis of &ldquo;Integrated System Theory&rdquo; of information security management, the study applies factor analysis and nominal group technique and collects opinions from experts to construct &ldquo;Hierarchical Structure of Information Security Valuation Criteria&rdquo;, which totally includes 9 valuation dimensions and 37 valuation criteria. The result may not only be a reference for the organization to make information security policies but also the foundation to further develop &ldquo;Information Security Multiple Criteria Valuation Model&rdquo;. It is obviously a key milestone of empirical studies of information security management.</span></span></span></p> |
url |
http://jlis.glis.ntnu.edu.tw/ojs/index.php/jlis/article/view/418 |
work_keys_str_mv |
AT hóngguóxìngjìyánpíngzhàoróngyàokwoshinghongyenpingchilouisrchao zīxùnānquánpínggūzhǔnzécéngjíjiégòuzhīyánjiūastudyofhierarchicalstructureofinformationsecurityvaluationcriteria |
_version_ |
1725584082512904192 |
spelling |
doaj-82c7a3c040894e32988680186d40e3582020-11-24T23:17:14ZengNational Taiwan Normal UniversityTushuguanxue yu Zixun Kexue0363-36402003-10-01292資訊安全評估準則層級結構之研究 | A Study of Hierarchical Structure of Information Security Valuation Criteria洪國興、季延平、趙榮耀 Kwo-Shing Hong、Yen-Ping Chi、 Louis R. Chao<p>頁次:22-44</p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; mso-layout-grid-align: none;"><span style="font-size: small;"><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">各種調查或研究均顯示,資訊安全事故的發生比例與其所造成的財務損失均不斷上升。美國</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">911</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">事件、台灣納莉颱風的水災、財金公司的舞弊案等,均顯示隨著資訊科技的快速發展,資訊系統使用者的範圍不斷擴大,組織對資訊系統依賴程度的提高,資訊安全因而日愈重要。但組織資訊安全如何評估?應考慮那些評估準則?尚乏實証研究。本研究以資訊安全管理「整合系統理論」(</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">Integrated System Theory</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">)為基礎,經由因素分</span></span><span style="font-size: small;"><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">析、名目群組技術(</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">Nominal Group Technique</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">)的程序,匯集專家意見,建構「資訊安全評估準則層級結構」,共有</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">9</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">個評估構面,</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">37</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">項評估準則,可作為組織規劃資訊安全策略之參考,亦可作為繼續發展「資訊安全多準則評估模式」(</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-family: Times New Roman;">Information Security Multiple Criteria Valuation Model</span></span><span style="font-family: &quot;新細明體&quot;,&quot;serif&quot;; mso-ascii-font-family: 'Times New Roman'; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-fareast;">)的基礎,實為資訊安全管理實証研究的重要里程碑。</span><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"></span></span></p><p class="MsoNormal" style="margin: 0cm 0cm 0pt; mso-layout-grid-align: none;"><span style="mso-fareast-font-family: 新細明體; mso-font-kerning: 0pt; mso-fareast-theme-font: minor-fareast;" lang="EN-US"><span style="font-size: small;"><span style="font-family: Times New Roman;">Most results of various investigations and studies have shown that the percentage of information security accidents occurred and the financial losses caused are increasing continuously. September 11 attacks in the U.S.A., floods of Nari typhoon and malfeasant cases of Financial Information Service Co., Ltd. in Taiwan all indicate that information security has being more important day by day as a result of fast development of information technology, increasing range of users and dependence of an organization on information system. How to evaluate information security of an organization and what valuation criteria should be considered still lack of empirical studies. On the basis of &ldquo;Integrated System Theory&rdquo; of information security management, the study applies factor analysis and nominal group technique and collects opinions from experts to construct &ldquo;Hierarchical Structure of Information Security Valuation Criteria&rdquo;, which totally includes 9 valuation dimensions and 37 valuation criteria. The result may not only be a reference for the organization to make information security policies but also the foundation to further develop &ldquo;Information Security Multiple Criteria Valuation Model&rdquo;. It is obviously a key milestone of empirical studies of information security management.</span></span></span></p> http://jlis.glis.ntnu.edu.tw/ojs/index.php/jlis/article/view/418 |