英文摘要
|
This study starts from exploring the mobile payment risks. Further, developing a risk management and auditing mechanism for organization under mobile payment environment. To ensure that organization’s risk controls are well-designed and effective implementation. Gowin’s Vee model is adopted in the research strategy. Through literature review and the Delphi expert questionnaire, this study constructs and revises a number of risk factors and audit items under the mobile payment environment. Total are 86 risk factors and 158 audit items. Then classifications of risk factors rely upon the cross-risk of enterprise from the Research Central of Economics. Further identify these items corresponding to risk categories. This study can be illustrated that the internal controls have the opportunity resolve the type of mobile payment risks, finally builds a manual of mobile payment risk management and audit. By the checklist in manual, plus CMMI model, organizations can execute self-assessment risk whether have related internal controls to effective management. Afterwards, these mechanisms inspect through a practical case to verify. In the interview, the inspection is understood not only the internal controls and audit approach in response to mobile payment, but also reveals feasibility of the mechanisms on the practical usage by the G digital enterprise of technology.
|
参考文献
|
-
林宜融、吳淑娟(2015)。行動支付之風險因子探討─以第三方支付為例。電腦稽核期刊,32,97-111。
連結:
-
IDC (2014)。IDC 公佈2015 年台灣ICT 市場十大趨勢預測:4G、物聯網、巨量資料與雲端應用帶動2015 市場創造歷史新高。檢索日期:2016 年6 月15 日,取自:http://www.idc.com.tw/about/448.html/
-
Thales(2015). Mobile Payments: Today's Challenge. Retrieved June 11, 2016, from: https://www.thales-esecurity.com/solutions/by-technology-focus/mobile-payments
-
Deloitte. (2013). Mobile payments: Opportunity vs. risk. Retrieved June 15, 2016, from : https://www2.deloitte.com/content/dam/Deloitte/uk/Documents/audit/deloitte-ukmobile-payments-opportunities-audit-advisory.pdf
-
周智禾(2014)。RSA conference Asia pacific & Japan 2014 報告。資通安全辦公室公務出國報告,未出版。
-
Gartner. (2012). Forecast: Mobile payment, worldwide, 2013 Update. Retrieved June 15, 2016, from : http://www.eettaiwan.com/ART_8800709769_617723_NT_e10bcfec.HTM
-
資安人(2015)。行動支付高攻擊風險持續延燒。檢索日期:2016 年6 月14 日。取自:http://www.informationsecurity.com.tw/article/article_detail.aspx?aid=8202/
-
證交所(2015)。內部控制制度有效性判斷參考項目。檢索日期:2016 年6 月14 日,取自: http://www.twse.com.tw/ch/announcement/official_result.php?DEC_DATE=104%2F07%2F15&DEC_DATE1=104%2F07%2F15&KIND=ALL&hs_file=all&sub=%ACd%B8%DF/
-
美國商業資訊(2015)。ISACA 調查:87%的網路安全專家認為行動支付資料外洩事件會上升,而有42%仍在使用這種支付方式。檢索日期:2016 年6 月10日, 取自: http://www.businesswire.com/news/home/20150925005248/zh-HK/#.Vgiwjsuqqko/
-
MilinBhise(2013)。為行動支付建立安全的無線網路。檢索日期:2016 年6 月10日,取自:http://www.eettaiwan.com/emag/1304_09_SL.html/
-
拓墣產業研究所(2015)。2018 年NFC 手機出貨可望突破12 億支,行動支付安全性成關鍵。TechNews 。檢索日期: 2016 年6 月10 日, 取自:http://technews.tw/2015/05/14/nfc-phone-2018-mobile-payment/
-
趨勢科技(2015)。【資料圖表】行動支付安全。檢索日期:2016 年6 月10 日,取自:http://blog.trendmicro.com.tw/?p=10861/
-
ISACA (2012). COBIT 5. Retrieved June 11, 2016, from: https://cobitonline.isaca.org/?cid=pr_1104545&appeal=pr
-
邱映曦(2014)。行動支付大未來。匯流政策研究室電子報,23。存取日期:2016年6 月11 日, 取自: https://drive.google.com/file/d/0B85Kc2PALpj3dU1kRkNGTFdhQ00/view
-
蔡佳昕、林嘉裕、陳怡娟、黃富纖(2013)。主要國家零售支付創新的調查分析(國際清算銀行2012 年出版)。中央銀行發行局翻譯報告,未出版。
-
ENISA(2010). Smartphones: Information security risks, opportunities and recommendations for users. Retrieved June 15, 2016, from : http://www.bankinfosecurity.co.uk/agency-releases/smartphones-information-security-risks-opportunities-r-2373
-
中國信託銀行(2016)。台灣大車隊QR 扣付款簡介。檢索日期:2016 年6 月15 日,取自: https://www.ctbcbank.com/CTCBPortalWeb/toPage?id=TW_RB_CM_creditcard_000167/
-
TRMG(2012). The top 10 risks for mobile payments. Retrieved June 15, 2016, from: http://www.lavastorm.com/assets/Top-10-Risks-for-Mobile-Payments-TRMG-3-12.pdf
-
經濟部工業局(2016)。CMMI 介紹。檢索日期:2016 年6 月15 日,取自:http://www.softwarevalue.org.tw/main/modules/MySpace/index.php?sn=sv&pg=ZC1618/
-
ISO/IEC(2011).ISO/IEC 27005 Information technology - Security techniques -Information security risk management. Retrieved June 11, 2016, from: http://www.iso27001security.com/html/27005.html
-
行政院研究發展考核委員會(2012)。行動裝置資安防護參考指引V1.0。檢索日期:2016 年6 月10 日,取自:http://www.nccst.nat.gov.tw/CommonSpecification/
-
OWASP (2012). The mobile App top 10 risks. Retrieved June 15, 2016, from https://www.owasp.org/images/9/94/MobileTopTen.pdf
-
林明海(2012)。NFC 行動支付與第三方支付應用的發展。檢索日期:2016 年6 月10 日, 取自: http://www.centerforpbbefr.rutgers.edu/TaipeiPBFR%26D/2013-06-01/PPT/04-3NFC 行動支付與第三方支付應用的發展.pdf
-
江榮倫、黃邦平、萬幼筠(2014)。電子支付安全風險管理與契機(上)。檢索日期:2016 年6 月10 日。取自:http://www2.deloitte.com/tw/tc/pages/risk/articles/newsletter-11-40.html/
-
Everett, C.(2011).A risky business: ISO 31000 and 27005 unwrapped.Computer Fraud & Security,2011(2),5-7.
-
ISACA(2011).,未出版
-
ISACA(2012).COBIT 5: A business framework for the governance and management of enterprise IT.
-
ISO,IEC(2009).ISO/IEC 31000 Risk management - principles and guidelines.
-
ISO,IEC(2013).ISO/IEC 27001 Information technology - security techniques -information security management systems - requirements.
-
NIST(2007).,未出版
-
Novak, J. D.,Gowin, D. B.(1984).Learning How to Learn.UK:Cambridge University Press.
-
SANS Institute(2012).,未出版
-
SCAMPI Upgrade Team(2006).Standard CMMI Appraisal Method for Process Improvement (SCAMPISM) A, Version 1.2: Method Definition Document (SEI-2011-HB-001).PA:Carnegie Mellon University.
-
Veugelen, W.,Desai, S.(2015).Security considerations for mobile payment devices: Trends, risks and countermeasures.RSA conference 2015
-
李培群(2010)。IT控制架構COBIT之探討─兼述GTAG之遵循。證交資料
-
周楷智(2015)。碩士論文(碩士論文)。嘉義,國立中正大學會計與資訊科技研究所。
-
林淑芸、金旻姍(2015)。美國COSO內部控制相關報告之介紹。證券暨期貨月刊,33(6),5-12。
-
洪士程編(2011)。RFID 概論。台中:朝陽科技大學。
-
香港無線科技商會(2012)。智能手機資訊保安實用電子指南。香港:香港生產力促進局。
-
陳俊德、鄭祐全(2008)。NFC 近端服務系統資訊安全政策風險評估之研究。2008 數位科技與創新管理研討會
-
黃俊超(2014)。行動支付新時代。先探,1796
-
葉慈章、王志翔、吳家陞(2013)。符合EPC Class 1 Generation 2的RFID向前安全性協定。中正嶺學報,42(1),189-198。
|