메뉴 건너뛰기
Library Notice
Institutional Access
If you certify, you can access the articles for free.
Check out your institutions.
ex)Hankuk University, Nuri Motors
Log in Register Help KOR
Subject

Study on Development of Framework of Company Classification in Information Security Perspective
Recommendations
Search

정보보호 관점의 기업 유형 분류 프레임워크 개발에 관한 연구

논문 기본 정보

Type
Academic journal
Author
Journal
한국산업경영시스템학회 산업경영시스템학회지 산업경영시스템학회지 제39권 제3호 KCI Accredited Journals
Published
2016.1
Pages
18 - 29 (12page)

Usage

cover
Study on Development of Framework of Company Classification in Information Security Perspective
Ask AI
Recommendations
Search

Research history (3)

  • Are you curious about the follow-up research of this article?
  • You can check more advanced research results through related academic papers or academic presentations.
  • Check the research history of this article

Abstract· Keywords

Report Errors
For most organizations, a security infrastructure to protect company’s core information and their technology is becoming increasingly important. So various approaches to information security have been made but many security accidents are still taking place. In fact, for many Korean companies, information security is perceived as an expense, not an asset. In order to change this perception, it is very important to recognize the need for information security and to find a rational approach for information security. The purpose of this study is to present a framework for information security strategies of companies. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. To develope measures to classify the types of companies, 12 information security professionals have done brainstorming, and based on previous studies, among the factors that have been demonstrated to be able to influence the information security of the enterprise, three factors have been selected. Delphi method was applied to 29 security experts in order to determine sub items for each factor, and then final items for evaluation was determined by verifying the content validity and reliability of the components through the SPSS analysis. Then, this study identified characteristics of each type of eight companies from a security perspective by utilizing the developed sub items, and summarized what kind of actual security accidents happened in the past.

Contents

No content found

References (44)

Add References

Recommendations

It is an article recommended by DBpia according to the article similarity. Check out the related articles!

Related Authors

Recently viewed articles

Comments(0)

0

Write first comments.