Case Studies on Adopting Full-Scope Information Security Management System in Organizations

碩士 === 長庚大學 === 資訊管理學研究所 === 97 ===   Replacing a large number of manual operations, the information systems become one of the most important infrastructures in enterprises. Therefore, enterprises have started to pay attention to the protection of its information assets. To avoid attack from externa...

Full description

Bibliographic Details
Main Authors: Chen Hung Wang, 王振鴻
Other Authors: J. J. Hwang
Format: Others
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/04948738289553420413
id ndltd-TW-097CGU05396048
record_format oai_dc
spelling ndltd-TW-097CGU053960482015-10-13T12:04:56Z http://ndltd.ncl.edu.tw/handle/04948738289553420413 Case Studies on Adopting Full-Scope Information Security Management System in Organizations 全組織導入資訊安全管理系統的個案研究 Chen Hung Wang 王振鴻 碩士 長庚大學 資訊管理學研究所 97   Replacing a large number of manual operations, the information systems become one of the most important infrastructures in enterprises. Therefore, enterprises have started to pay attention to the protection of its information assets. To avoid attack from external or destroy from internal, strengthening risk management and reducing the occurrence of security incidents has become the focus point to ensure the confidentiality, integrity and availability of information systems and assets.   The International Organization for Standardization officially announced ISO 27001 in April 2005. This standard is the most wildly accepted and adopted standard in the world. Based upon continual feedback management cycle, the ISO 27001 standard implements asset identification, reduces risk management, and develops information security policies to achieve the organizational objective for information security management.   Interviews and surveys are performed to study four cases of organizational adaption and certification of ISMS. In particular, the following topics concerning full-scope adaptation of ISMS are presented through in-depth analysis: 1.Evaluation aspects of full-scope adaptation, 2.Critical success factors, 3.Difficulties encountered, and 4.Benefits from adopting ISMS. J. J. Hwang 黃景彰 2009 學位論文 ; thesis 152
collection NDLTD
format Others
sources NDLTD
description 碩士 === 長庚大學 === 資訊管理學研究所 === 97 ===   Replacing a large number of manual operations, the information systems become one of the most important infrastructures in enterprises. Therefore, enterprises have started to pay attention to the protection of its information assets. To avoid attack from external or destroy from internal, strengthening risk management and reducing the occurrence of security incidents has become the focus point to ensure the confidentiality, integrity and availability of information systems and assets.   The International Organization for Standardization officially announced ISO 27001 in April 2005. This standard is the most wildly accepted and adopted standard in the world. Based upon continual feedback management cycle, the ISO 27001 standard implements asset identification, reduces risk management, and develops information security policies to achieve the organizational objective for information security management.   Interviews and surveys are performed to study four cases of organizational adaption and certification of ISMS. In particular, the following topics concerning full-scope adaptation of ISMS are presented through in-depth analysis: 1.Evaluation aspects of full-scope adaptation, 2.Critical success factors, 3.Difficulties encountered, and 4.Benefits from adopting ISMS.
author2 J. J. Hwang
author_facet J. J. Hwang
Chen Hung Wang
王振鴻
author Chen Hung Wang
王振鴻
spellingShingle Chen Hung Wang
王振鴻
Case Studies on Adopting Full-Scope Information Security Management System in Organizations
author_sort Chen Hung Wang
title Case Studies on Adopting Full-Scope Information Security Management System in Organizations
title_short Case Studies on Adopting Full-Scope Information Security Management System in Organizations
title_full Case Studies on Adopting Full-Scope Information Security Management System in Organizations
title_fullStr Case Studies on Adopting Full-Scope Information Security Management System in Organizations
title_full_unstemmed Case Studies on Adopting Full-Scope Information Security Management System in Organizations
title_sort case studies on adopting full-scope information security management system in organizations
publishDate 2009
url http://ndltd.ncl.edu.tw/handle/04948738289553420413
work_keys_str_mv AT chenhungwang casestudiesonadoptingfullscopeinformationsecuritymanagementsysteminorganizations
AT wángzhènhóng casestudiesonadoptingfullscopeinformationsecuritymanagementsysteminorganizations
AT chenhungwang quánzǔzhīdǎorùzīxùnānquánguǎnlǐxìtǒngdegèànyánjiū
AT wángzhènhóng quánzǔzhīdǎorùzīxùnānquánguǎnlǐxìtǒngdegèànyánjiū
_version_ 1716852453761089536