資訊安全內部管理之研究-G2B電子公文專案之探討

碩士 === 國立臺北大學 === 公共行政暨政策學系 === 98 === Nowadays many industries and governmental organizations have stepped into the operating environment of digital data; however, it is easy to duplicate and spread digital data and the internet is very prevalent today, which has resulted in the endless disclosure...

Full description

Bibliographic Details
Main Authors: Pei-Shiuan Wu, 吳佩璇
Other Authors: CHANG,SHIH-HSIEN
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/49845560523327893264
id ndltd-TW-098NTPU0610014
record_format oai_dc
spelling ndltd-TW-098NTPU06100142016-04-27T04:10:58Z http://ndltd.ncl.edu.tw/handle/49845560523327893264 資訊安全內部管理之研究-G2B電子公文專案之探討 Pei-Shiuan Wu 吳佩璇 碩士 國立臺北大學 公共行政暨政策學系 98 Nowadays many industries and governmental organizations have stepped into the operating environment of digital data; however, it is easy to duplicate and spread digital data and the internet is very prevalent today, which has resulted in the endless disclosure events of internal important confidential documents, making the organizations suffer from not only the loss of reputation but also the serious loss of the substantive property owing to the letting out of the core technology. In the past, the organizations usually spent a lot of time and cost in guarding against the unlawful attack from the external users, but the occurrence of the issues of information security today mainly arises from the illegal stealing of the internal employees instead of the external attack, which makes it impossible to offer the organizations the overall information security protection through the traditional structure. In order to prevent the internal employees from stealing, disclosing, or selling the confidential documents through the lawful channels, thus causing serious loss, more and more industries and governmental organizations have begun to face up to and try to solve the information security problems and the introduction of information security management standard is one of the general solutions. The International Organization for Standardization officially announced ISO 27001 in 2005. It is the information security management standard that is accepted and adopted by the most industry organizations in the world. The organizations can attain their objective of information security management through continual feedback management cycle. This research uses Theory of Constraints to find out the problems which may happen while the organization introduces Information Security Policy, and then applies logical relationship to locating the crucial problem. The research also employs Conflict Logic to find out the practicable solution. In addition, aiming at the possible obstacles that may occur in execution, elimination projects are proposed to reduce the risk of information security and the occurrence of information security issues. CHANG,SHIH-HSIEN 張世賢 2010 學位論文 ; thesis 0 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺北大學 === 公共行政暨政策學系 === 98 === Nowadays many industries and governmental organizations have stepped into the operating environment of digital data; however, it is easy to duplicate and spread digital data and the internet is very prevalent today, which has resulted in the endless disclosure events of internal important confidential documents, making the organizations suffer from not only the loss of reputation but also the serious loss of the substantive property owing to the letting out of the core technology. In the past, the organizations usually spent a lot of time and cost in guarding against the unlawful attack from the external users, but the occurrence of the issues of information security today mainly arises from the illegal stealing of the internal employees instead of the external attack, which makes it impossible to offer the organizations the overall information security protection through the traditional structure. In order to prevent the internal employees from stealing, disclosing, or selling the confidential documents through the lawful channels, thus causing serious loss, more and more industries and governmental organizations have begun to face up to and try to solve the information security problems and the introduction of information security management standard is one of the general solutions. The International Organization for Standardization officially announced ISO 27001 in 2005. It is the information security management standard that is accepted and adopted by the most industry organizations in the world. The organizations can attain their objective of information security management through continual feedback management cycle. This research uses Theory of Constraints to find out the problems which may happen while the organization introduces Information Security Policy, and then applies logical relationship to locating the crucial problem. The research also employs Conflict Logic to find out the practicable solution. In addition, aiming at the possible obstacles that may occur in execution, elimination projects are proposed to reduce the risk of information security and the occurrence of information security issues.
author2 CHANG,SHIH-HSIEN
author_facet CHANG,SHIH-HSIEN
Pei-Shiuan Wu
吳佩璇
author Pei-Shiuan Wu
吳佩璇
spellingShingle Pei-Shiuan Wu
吳佩璇
資訊安全內部管理之研究-G2B電子公文專案之探討
author_sort Pei-Shiuan Wu
title 資訊安全內部管理之研究-G2B電子公文專案之探討
title_short 資訊安全內部管理之研究-G2B電子公文專案之探討
title_full 資訊安全內部管理之研究-G2B電子公文專案之探討
title_fullStr 資訊安全內部管理之研究-G2B電子公文專案之探討
title_full_unstemmed 資訊安全內部管理之研究-G2B電子公文專案之探討
title_sort 資訊安全內部管理之研究-g2b電子公文專案之探討
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/49845560523327893264
work_keys_str_mv AT peishiuanwu zīxùnānquánnèibùguǎnlǐzhīyánjiūg2bdiànzigōngwénzhuānànzhītàntǎo
AT wúpèixuán zīxùnānquánnèibùguǎnlǐzhīyánjiūg2bdiànzigōngwénzhuānànzhītàntǎo
_version_ 1718249139201900544