Assessment of Information Security Influencing Factors

碩士 === 中原大學 === 資訊管理研究所 === 104 === In recent years, advances in Internet so that people rely on computers increasing influence is also growing, and companies face global competition under the information technology and electronics progress and development, and further the development of e-policy an...

Full description

Bibliographic Details
Main Authors: Chen, Chun-Wei, 陳俊瑋
Other Authors: Chih-li Hung
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/hj6jpt
id ndltd-TW-104CYCU5396023
record_format oai_dc
spelling ndltd-TW-104CYCU53960232019-05-15T22:53:34Z http://ndltd.ncl.edu.tw/handle/hj6jpt Assessment of Information Security Influencing Factors 資訊安全規範影響因素評估 Chen, Chun-Wei 陳俊瑋 碩士 中原大學 資訊管理研究所 104 In recent years, advances in Internet so that people rely on computers increasing influence is also growing, and companies face global competition under the information technology and electronics progress and development, and further the development of e-policy and security policy needed to respond to information security threats. So many organizations have been planning to import information security systems, but large-scale import of funds, so that enterprises in importing do not know the door into the room, or waste a lot of resources on the import, the study will focus on the country through ISO 27001 certification enterprise, the expert questionnaire distributed to businesses, hoping to use AHP level analysis to identify the factors critical to success of ISO 27001. In this study, the experts issued questionnaire method, for all enterprises at all levels of the heavy weight carried feedback information respondents had to identify critical success factors for introducing ISO 27001 re-use AHP AHP, research results, mostly for high-end subjective identity within the enterprise ISO 27001 is the first key to import critical success factors, and with the participation of all employees working in the enterprise is more important critical success factors indicators; advocacy and promotion of IT security policies also have a higher impact on the ranking. The nature of the telecommunications services company, has relied on a relatively good operational goals of information security policy, so the difference in the company compared with the nature of the semiconductor industry, the data would be more intense, and the nature of the semiconductor industry companies will pay more attention to the institutional side , rationality and applicability of the project a key factor in the design of the system will be stronger than information security policy in line with operational objectives, analyzed in this study and the results from the data in order to provide the experience of not introducing ISO 27001 organization Share directions and recommendations. Finally, according to the results of this study were discussed, and the follow-up study suggests. Chih-li Hung 洪智力 2016 學位論文 ; thesis 67 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 中原大學 === 資訊管理研究所 === 104 === In recent years, advances in Internet so that people rely on computers increasing influence is also growing, and companies face global competition under the information technology and electronics progress and development, and further the development of e-policy and security policy needed to respond to information security threats. So many organizations have been planning to import information security systems, but large-scale import of funds, so that enterprises in importing do not know the door into the room, or waste a lot of resources on the import, the study will focus on the country through ISO 27001 certification enterprise, the expert questionnaire distributed to businesses, hoping to use AHP level analysis to identify the factors critical to success of ISO 27001. In this study, the experts issued questionnaire method, for all enterprises at all levels of the heavy weight carried feedback information respondents had to identify critical success factors for introducing ISO 27001 re-use AHP AHP, research results, mostly for high-end subjective identity within the enterprise ISO 27001 is the first key to import critical success factors, and with the participation of all employees working in the enterprise is more important critical success factors indicators; advocacy and promotion of IT security policies also have a higher impact on the ranking. The nature of the telecommunications services company, has relied on a relatively good operational goals of information security policy, so the difference in the company compared with the nature of the semiconductor industry, the data would be more intense, and the nature of the semiconductor industry companies will pay more attention to the institutional side , rationality and applicability of the project a key factor in the design of the system will be stronger than information security policy in line with operational objectives, analyzed in this study and the results from the data in order to provide the experience of not introducing ISO 27001 organization Share directions and recommendations. Finally, according to the results of this study were discussed, and the follow-up study suggests.
author2 Chih-li Hung
author_facet Chih-li Hung
Chen, Chun-Wei
陳俊瑋
author Chen, Chun-Wei
陳俊瑋
spellingShingle Chen, Chun-Wei
陳俊瑋
Assessment of Information Security Influencing Factors
author_sort Chen, Chun-Wei
title Assessment of Information Security Influencing Factors
title_short Assessment of Information Security Influencing Factors
title_full Assessment of Information Security Influencing Factors
title_fullStr Assessment of Information Security Influencing Factors
title_full_unstemmed Assessment of Information Security Influencing Factors
title_sort assessment of information security influencing factors
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/hj6jpt
work_keys_str_mv AT chenchunwei assessmentofinformationsecurityinfluencingfactors
AT chénjùnwěi assessmentofinformationsecurityinfluencingfactors
AT chenchunwei zīxùnānquánguīfànyǐngxiǎngyīnsùpínggū
AT chénjùnwěi zīxùnānquánguīfànyǐngxiǎngyīnsùpínggū
_version_ 1719136250241220608