A Study of Information Security Governance- A Case Study of Government Sectors

碩士 === 淡江大學 === 資訊管理學系碩士班 === 96 === According to the report of RDEC (Research, Development and Evaluation Commission, Executive Yuan), more than 90% government sectors indicate that there are three imperative difficulties awaited being overcome, including the abilities of information security, a la...

Full description

Bibliographic Details
Main Authors: Szu-Ching Wu, 吳偲箐
Other Authors: Ming-Dar Hwang
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/79825813403370916356
id ndltd-TW-096TKU05396011
record_format oai_dc
spelling ndltd-TW-096TKU053960112015-10-13T13:47:53Z http://ndltd.ncl.edu.tw/handle/79825813403370916356 A Study of Information Security Governance- A Case Study of Government Sectors 資通安全治理之研究-以政府部門為例 Szu-Ching Wu 吳偲箐 碩士 淡江大學 資訊管理學系碩士班 96 According to the report of RDEC (Research, Development and Evaluation Commission, Executive Yuan), more than 90% government sectors indicate that there are three imperative difficulties awaited being overcome, including the abilities of information security, a lack of related experiences and dedicated personnel. Therefore, the government starts to contemplate the problems and expects the officer of each government sector could pay close attention and join more security-related activities through adopting Information Security Governance Mechanism. Hence, STAG (Science and Technology Advisory Group of Executive Yuan) proposed a research plan developing Information Security Governance Mechanism which fits government sectors of our country. The author of this study is one of the members of the research plan. This research plan develops an Information Security Governance Maturity Assessment Tool in addition to government sectors’ Information Security Governance Mechanism. Through multiple case studies and in-depth interview, we discuss three government sectors’ ISG Maturity and real conditions of information security, and further, propose potential difficulties. The research indicates three government organizations’ ISG maturity and real security conditions, recommend execution steps and proposes the difficulties of human resources and budget. Ming-Dar Hwang 黃明達 2008 學位論文 ; thesis 90 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 淡江大學 === 資訊管理學系碩士班 === 96 === According to the report of RDEC (Research, Development and Evaluation Commission, Executive Yuan), more than 90% government sectors indicate that there are three imperative difficulties awaited being overcome, including the abilities of information security, a lack of related experiences and dedicated personnel. Therefore, the government starts to contemplate the problems and expects the officer of each government sector could pay close attention and join more security-related activities through adopting Information Security Governance Mechanism. Hence, STAG (Science and Technology Advisory Group of Executive Yuan) proposed a research plan developing Information Security Governance Mechanism which fits government sectors of our country. The author of this study is one of the members of the research plan. This research plan develops an Information Security Governance Maturity Assessment Tool in addition to government sectors’ Information Security Governance Mechanism. Through multiple case studies and in-depth interview, we discuss three government sectors’ ISG Maturity and real conditions of information security, and further, propose potential difficulties. The research indicates three government organizations’ ISG maturity and real security conditions, recommend execution steps and proposes the difficulties of human resources and budget.
author2 Ming-Dar Hwang
author_facet Ming-Dar Hwang
Szu-Ching Wu
吳偲箐
author Szu-Ching Wu
吳偲箐
spellingShingle Szu-Ching Wu
吳偲箐
A Study of Information Security Governance- A Case Study of Government Sectors
author_sort Szu-Ching Wu
title A Study of Information Security Governance- A Case Study of Government Sectors
title_short A Study of Information Security Governance- A Case Study of Government Sectors
title_full A Study of Information Security Governance- A Case Study of Government Sectors
title_fullStr A Study of Information Security Governance- A Case Study of Government Sectors
title_full_unstemmed A Study of Information Security Governance- A Case Study of Government Sectors
title_sort study of information security governance- a case study of government sectors
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/79825813403370916356
work_keys_str_mv AT szuchingwu astudyofinformationsecuritygovernanceacasestudyofgovernmentsectors
AT wúcāiqìng astudyofinformationsecuritygovernanceacasestudyofgovernmentsectors
AT szuchingwu zītōngānquánzhìlǐzhīyánjiūyǐzhèngfǔbùménwèilì
AT wúcāiqìng zītōngānquánzhìlǐzhīyánjiūyǐzhèngfǔbùménwèilì
AT szuchingwu studyofinformationsecuritygovernanceacasestudyofgovernmentsectors
AT wúcāiqìng studyofinformationsecuritygovernanceacasestudyofgovernmentsectors
_version_ 1717743464109572096