题名

Study of a Risk Management Model

作者

Marn-Ling Shing;Chen-Chi Shing;Kuo-Lane Chen;Huei Lee

关键词

Information Security Risk Management ; Information Security Assessment ; Information Security Modeling and Simulation ; Information Security Model Validation

期刊名称

International Journal of Electronic Commerce Studies

卷期/出版年月

2卷1期(2011 / 06 / 01)

页次

67 - 76

内容语文

英文

英文摘要

Risk management has become an important issue in the information security area. This study proposes a Semi-Markov chain model to manage the information security risk. When the state information is not recognized as a normal state, the model can send a warning signal to the manager. A simulated model was used to validate the semi-Markov chain model.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 經濟學
社會科學 > 財金及會計學
社會科學 > 管理學
参考文献
  1. Aburdene, M.(1988).Computer Simulation of Dynamic Systems.Dubuque, IA:Wm. C. Brown Publishing.
  2. Banks, J.,Carson, J.,Nelson, B.(1996).Discrete Event System Simulation.New Jersey:Prentice Hall.
  3. Bhat, N.(1972).Elements of Applied Stochastic Processes.New York:John Wiley & Sons.
  4. Bishop, M.(2003).Computer Security: Art and Science.Boston, MA:Addison-Wesley.
  5. Bodin, L. D.,Gordon, L. A.,Loeb, M. P.(2008).Information Security and Risk Management.Communications of the ACM,51(4),64-68.
  6. Chen, K. L.,Lee, H.,Yang, J.(2006).Security considerations on the design of supply chain networks.Proceedings of the Southwest Division of The Decision Sciences Institute (SWDSI),Oklahoma:
  7. Chen, K. L.,Shing, M.,Lee, H.,Shing, C.(2007).Modeling in confidentiality and integrity for a supply chain network.Communications of IIMA,7(1),41-48.
  8. Keil, M.,Tiwana, A.,Bush, A.(2002).Reconciling user and project manager perceptions of IT project risk: a Delphi study.Information Systems Journal,12(2),103-119.
  9. Molloy, M.(1988).Fundamentals of Performance Modeling.New York:Macmillan Publishing.
  10. Rainer, R.K.J.R.,Snyder, C.A.,Carr, H.H.(1991).Risk analysis for information technology.Journal of Management Information Systems,8(1),129-147.
  11. Rencher, A.(1995).Methods of Multivariate Analysis.New York:John Wiley & Sons.
  12. Shing, M.,Shing, C.,Chen, K.,Lee, H.(2007).Security Modeling on The Supply Chain Networks.Journal of Systemics, Cybernetics and Informatics,5(5),53-58.
  13. Symantec, U.S. Information Security Law, Part Four. Retrieved October 21, 2010, from http://www.symantec.com/connect/articles/us-information-security-law-part-four
  14. The Committee on National Security Systems (CNSS), CNSS Instruction, No. 4009, 2003. Retrieved October 21, 2010, from http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf.