A Study of Information Security Governance- A Case Study of Government Sectors
碩士 === 淡江大學 === 資訊管理學系碩士班 === 96 === According to the report of RDEC (Research, Development and Evaluation Commission, Executive Yuan), more than 90% government sectors indicate that there are three imperative difficulties awaited being overcome, including the abilities of information security, a la...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/79825813403370916356 |
id |
ndltd-TW-096TKU05396011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096TKU053960112015-10-13T13:47:53Z http://ndltd.ncl.edu.tw/handle/79825813403370916356 A Study of Information Security Governance- A Case Study of Government Sectors 資通安全治理之研究-以政府部門為例 Szu-Ching Wu 吳偲箐 碩士 淡江大學 資訊管理學系碩士班 96 According to the report of RDEC (Research, Development and Evaluation Commission, Executive Yuan), more than 90% government sectors indicate that there are three imperative difficulties awaited being overcome, including the abilities of information security, a lack of related experiences and dedicated personnel. Therefore, the government starts to contemplate the problems and expects the officer of each government sector could pay close attention and join more security-related activities through adopting Information Security Governance Mechanism. Hence, STAG (Science and Technology Advisory Group of Executive Yuan) proposed a research plan developing Information Security Governance Mechanism which fits government sectors of our country. The author of this study is one of the members of the research plan. This research plan develops an Information Security Governance Maturity Assessment Tool in addition to government sectors’ Information Security Governance Mechanism. Through multiple case studies and in-depth interview, we discuss three government sectors’ ISG Maturity and real conditions of information security, and further, propose potential difficulties. The research indicates three government organizations’ ISG maturity and real security conditions, recommend execution steps and proposes the difficulties of human resources and budget. Ming-Dar Hwang 黃明達 2008 學位論文 ; thesis 90 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 淡江大學 === 資訊管理學系碩士班 === 96 === According to the report of RDEC (Research, Development and Evaluation Commission, Executive Yuan), more than 90% government sectors indicate that there are three imperative difficulties awaited being overcome, including the abilities of information security, a lack of related experiences and dedicated personnel. Therefore, the government starts to contemplate the problems and expects the officer of each government sector could pay close attention and join more security-related activities through adopting Information Security Governance Mechanism. Hence, STAG (Science and Technology Advisory Group of Executive Yuan) proposed a research plan developing Information Security Governance Mechanism which fits government sectors of our country.
The author of this study is one of the members of the research plan. This research plan develops an Information Security Governance Maturity Assessment Tool in addition to government sectors’ Information Security Governance Mechanism. Through multiple case studies and in-depth interview, we discuss three government sectors’ ISG Maturity and real conditions of information security, and further, propose potential difficulties.
The research indicates three government organizations’ ISG maturity and real security conditions, recommend execution steps and proposes the difficulties of human resources and budget.
|
author2 |
Ming-Dar Hwang |
author_facet |
Ming-Dar Hwang Szu-Ching Wu 吳偲箐 |
author |
Szu-Ching Wu 吳偲箐 |
spellingShingle |
Szu-Ching Wu 吳偲箐 A Study of Information Security Governance- A Case Study of Government Sectors |
author_sort |
Szu-Ching Wu |
title |
A Study of Information Security Governance- A Case Study of Government Sectors |
title_short |
A Study of Information Security Governance- A Case Study of Government Sectors |
title_full |
A Study of Information Security Governance- A Case Study of Government Sectors |
title_fullStr |
A Study of Information Security Governance- A Case Study of Government Sectors |
title_full_unstemmed |
A Study of Information Security Governance- A Case Study of Government Sectors |
title_sort |
study of information security governance- a case study of government sectors |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/79825813403370916356 |
work_keys_str_mv |
AT szuchingwu astudyofinformationsecuritygovernanceacasestudyofgovernmentsectors AT wúcāiqìng astudyofinformationsecuritygovernanceacasestudyofgovernmentsectors AT szuchingwu zītōngānquánzhìlǐzhīyánjiūyǐzhèngfǔbùménwèilì AT wúcāiqìng zītōngānquánzhìlǐzhīyánjiūyǐzhèngfǔbùménwèilì AT szuchingwu studyofinformationsecuritygovernanceacasestudyofgovernmentsectors AT wúcāiqìng studyofinformationsecuritygovernanceacasestudyofgovernmentsectors |
_version_ |
1717743464109572096 |