A Study of Risk Assessment Mechanism for Personal Information Operations
碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In recent years, the application of information technologies have become one of the key factor for companies to make business successfully and competitively. However, with the evolution of the times, all of the information security events resulting from the u...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/73750566800171930255 |
id |
ndltd-TW-101CCU00736032 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101CCU007360322016-03-23T04:14:08Z http://ndltd.ncl.edu.tw/handle/73750566800171930255 A Study of Risk Assessment Mechanism for Personal Information Operations 個人資料作業風險評鑑機制之建構與實證 Su, Jung-Jei 蘇仲杰 碩士 國立中正大學 會計與資訊科技研究所 101 In recent years, the application of information technologies have become one of the key factor for companies to make business successfully and competitively. However, with the evolution of the times, all of the information security events resulting from the use of information technologies occurred one after another. The events of SONY Japan in 2011 and Mega Financial Holding Taiwan in 2012, for example, due to the information security accidents of website hacked and the careless supervision for hard disk drive destruction process, respectively, resulted in a lot of personal information leakage, and was fined by Taiwan's judicial authorities and FSC. In Taiwan, Personal Information Protection Act was implemented formally in 2102, the protected subject and object was expanded, all of today's natural and various forms of information are protected and regulated by the new law. In the new law, the penalty is also enhanced and strictly requires that some rules must be followed during the process of collecting, processing, and using, and the implementation of this low should results in different levels of impact to those organizations who own personal information. Therefore, it is expected to build up a risk assessment mechanism in this research to help enterprises effectively identify those possible risks generated during the process (collection, processing, and using) of personal information. In this research, Gowin's Vee research strategy is adapted. In theoretical side, the literature collecting and studying are based on the approach of Grounded Theory to identify the possible risk (factors), and build up the risk assessment mechanism (discussed in this research) by the 64 risk factors classification framework which is generated from the 11 control areas of ISO 27001. Then, make sure the risk factors discussed in this research are suitable through the mechanism modification by expert questionnaires distribution. In the methodological side, through interviewing individual case to realize the impact to the implementation of the Personal Information Protection Act in the industry, and take further feasibility evaluation. Based on the results of this research, it is expected that an effective and quick method is developed to assist enterprises to identify possible risks and the importance of those risks in processing personal information, such that, the enterprises will not ignore those possible risks, on the same time, will not misjudge the importance of those risks either, therefore, reduce the chance of risk and possibility of illegal issues or personal information leakage generated by enterprise. Chang, She-I 張碩毅 2013 學位論文 ; thesis 280 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中正大學 === 會計與資訊科技研究所 === 101 === In recent years, the application of information technologies have become one of the key factor for companies to make business successfully and competitively. However, with the evolution of the times, all of the information security events resulting from the use of information technologies occurred one after another. The events of SONY Japan in 2011 and Mega Financial Holding Taiwan in 2012, for example, due to the information security accidents of website hacked and the careless supervision for hard disk drive destruction process, respectively, resulted in a lot of personal information leakage, and was fined by Taiwan's judicial authorities and FSC.
In Taiwan, Personal Information Protection Act was implemented formally in 2102, the protected subject and object was expanded, all of today's natural and various forms of information are protected and regulated by the new law. In the new law, the penalty is also enhanced and strictly requires that some rules must be followed during the process of collecting, processing, and using, and the implementation of this low should results in different levels of impact to those organizations who own personal information. Therefore, it is expected to build up a risk assessment mechanism in this research to help enterprises effectively identify those possible risks generated during the process (collection, processing, and using) of personal information.
In this research, Gowin's Vee research strategy is adapted. In theoretical side, the literature collecting and studying are based on the approach of Grounded Theory to identify the possible risk (factors), and build up the risk assessment mechanism (discussed in this research) by the 64 risk factors classification framework which is generated from the 11 control areas of ISO 27001. Then, make sure the risk factors discussed in this research are suitable through the mechanism modification by expert questionnaires distribution. In the methodological side, through interviewing individual case to realize the impact to the implementation of the Personal Information Protection Act in the industry, and take further feasibility evaluation. Based on the results of this research, it is expected that an effective and quick method is developed to assist enterprises to identify possible risks and the importance of those risks in processing personal information, such that, the enterprises will not ignore those possible risks, on the same time, will not misjudge the importance of those risks either, therefore, reduce the chance of risk and possibility of illegal issues or personal information leakage generated by enterprise.
|
author2 |
Chang, She-I |
author_facet |
Chang, She-I Su, Jung-Jei 蘇仲杰 |
author |
Su, Jung-Jei 蘇仲杰 |
spellingShingle |
Su, Jung-Jei 蘇仲杰 A Study of Risk Assessment Mechanism for Personal Information Operations |
author_sort |
Su, Jung-Jei |
title |
A Study of Risk Assessment Mechanism for Personal Information Operations |
title_short |
A Study of Risk Assessment Mechanism for Personal Information Operations |
title_full |
A Study of Risk Assessment Mechanism for Personal Information Operations |
title_fullStr |
A Study of Risk Assessment Mechanism for Personal Information Operations |
title_full_unstemmed |
A Study of Risk Assessment Mechanism for Personal Information Operations |
title_sort |
study of risk assessment mechanism for personal information operations |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/73750566800171930255 |
work_keys_str_mv |
AT sujungjei astudyofriskassessmentmechanismforpersonalinformationoperations AT sūzhòngjié astudyofriskassessmentmechanismforpersonalinformationoperations AT sujungjei gèrénzīliàozuòyèfēngxiǎnpíngjiànjīzhìzhījiàngòuyǔshízhèng AT sūzhòngjié gèrénzīliàozuòyèfēngxiǎnpíngjiànjīzhìzhījiàngòuyǔshízhèng AT sujungjei studyofriskassessmentmechanismforpersonalinformationoperations AT sūzhòngjié studyofriskassessmentmechanismforpersonalinformationoperations |
_version_ |
1718211409768087552 |