Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Allen J (2005) An introduction to governing for enterprise security. Software Engineering Institute, Carnegie Mellon University in Pittsburgh.
Alter S(1999) Information systems: a management perspective. Addison-Wesley, New York.
Appel W (2005) Redefining IT governance readiness. META Group.
Bates RJ (1991) Disaster recovery planning. McGraw-Hill, New York.
Beall S, Hodges R (2002) Protection and security: software comparison columns. Gartner Inc., Stamford.
Blakley B (2001) Returns on security investment: an imprecise but necessary calculation. Secure Business Quarterly 1.
Connell B, Rochet P, Chow E, Savino L, Payne P (2004) Enterprise governance: getting the balance right. International Federation of Accountants.
Conner FW, Coviello AW (2004) Information security governance: a call to action. National Cyber Security Summit Task Force.
Dallas S, Bell M (2004) The need for IT governance: now more than ever. Gartner Inc., Stamford.
Dallas S (2002) Six IT governance rules to boost IT and user credibility. Gartner Inc., Stamford.
Firth R, Fraser B, Konda S, Simmel D (1998) An approach for selecting and specifying tools for information survivability. Software Engineering Institute, Carnegie Mellon University in Pittsburgh.
Fites PE, Kratz MPJ, Brebner AF (1989) Controls and security of computer information systems. Computer Science Press, Rockville.
GDRC (2005) The global development research center (http://www.gdrc.org)
Geer DE (2001) Making choices to show ROI. Secure Business Quarterly 1.
Gerrard M (2003) Creating an effective IT governance process. Gartner Inc., Stamford.
Gilbert IE (1989) Guide for selecting automated risk analysis tools (SP 500-174). NIST, Gaithersburg.
Harris S (2003) CISSP all-in-one exam guide 2nd edition. McGraw-Hill, New York.
Henze D (2000) IT baseline protection manual. Federal Agency for Security in Information Technology, Germany.
Hutt AE (1988) Management’s roles in computer security. In: Hutt AE (eds) Computer security handbook. Macmillan, New York.
Institute on Governance (2005) What is governance?: getting to a definition (http://www.iog.ca)
ISO13335-1: information technology - guidelines for the management of IT security - part 1: concepts and models for IT security. International Organization for Standardization, Geneva.
ISO17799: information technology - security techniques - code of practice for information security management. International Organization for Standardization, Geneva.
IT Governance Institute (2001) Board briefing on IT governance. IT Governance Institute, Rolling Meadows.
IT Governance Institute (2004) Information security governance. IT Governance Institute, Rolling Meadows.
IT Governance Institute (2001) Information security governance: guidance for boards of directors and executive management. IT Governance Institute, Rolling Meadows.
Kavanaugh K (2001) Security services: focusing on user needs. Gartner Inc., Stamford.
Kim S, Lee HJ (2005) Cost-benefit analysis of security investments: a methodology and case study. Lecture Notes in Computer Science 3482: 1239-1248.
Kim S, Leem CS (2004) An evaluation methodology of enterprise security management systems. Fifth International Conference on Operations and Quantitative Management, Seoul.
Kim S, Leem CS (2004) An information engineering methodology for the security strategy planning. Lecture Notes in Computer Science 3482: 597-607.
Kim S, Leem CS (2004) Decision supporting method with the analytic hierarchy process model for the systematic selection of COTS-based security control. Lecture Series on Computer Science and on Computational Sciences 1: 896-899.
Kim S, Leem CS (2004) Implementation of the security system for instant messengers. Lecture Notes in Computer Science 3314: 739-744.
Kim S, Leem CS (2004) Information strategy planning methodology for the security of information systems. ICCIE 2004, Cheju.
Kim S, Leem CS (2005) Security of the internet-based instant messenger: risks and safeguards. Internet Research: Electronic Networking Applications and Policy 15: 88-98.
Kim S, Choi SS, Leem CS (1999) An integrated framework for secure e-business models and their implementation. INFORMS’99, Seoul.
Kim S (2002) Security consultant training handbook. HIT, Seoul.
Krutz RL, Vines RD (2001) The CISSP prep guide: mastering the ten domains of computer security. John Wiley and Sons, New York.
Lynch G., Stenmark I (1996) A methodology for rating security vendors. Gartner Inc., Stamford.
Malik W (2001) A security funding strategy. Gartner Inc., Stamford.
Marianne S (1998) Guide for developing security plans for information technology systems. NIST, Gaithersburg.
Mingay S, Bittinger S (2002) Combine CobiT and ITIL for powerful IT governance. Gartner Inc., Stamford.
Moulton R, Coles RS (2003) Applying information security governance. Computers and Security 22: 580-584.
Neela AM, Mahoney J (2003) Work with, not against, your culture to refine IT governance. Gartner Inc., Stamford.
NIST (1995) An introduction to computer security: the NIST handbook. NIST, Gaithersburg.
NIST (2001) Security self-assessment guide for information technology systems. NIST, Gaithersburg.
OECD (1999) OECD principles of corporate governance. Organization for Economic Cooperation and Development.
Polk WT, Bassham LE (1992) A guide to the selection of anti-virus tools and techniques (SP 800-5). NIST, Gaithersburg.
Posthumus S, Solms RV (2004) A framework for the governance of information security. Computers and Security 23: 638-646.
Power R (2002) CSI/FBI computer crime and security survey. Federal Bureau of Investigation, Washington.
Rex RK, Charles SA, Houston CH (1991) Risk analysis for information technology. Journal of Management Information Systems 8.
Ron W (1988) EDP auditing: conceptual foundations and practice. McGraw-Hill, New York.
Roper CA (1999) Risk management for security professionals. Butterworth-Heinemann, Boston.
Schweitzer JA (1983) Protecting information in the electronic workplace: a guide for managers. Reston Publishing Company, Reston.
Scott D (1998) Security investment justification and success factors. Gartner Inc., Stamford.
SEI (1999) A systems engineering capability maturity model version 2. Software Engineering Institute, Carnegie Mellon University in Pittsburgh.
Solms BV, Solms RV (2005) From information security to business security?. Computers and Security 24: 271-273.
Solms BV (2001) Corporate governance and information security. Computers and Security 20: 215-218.
Solms BV (2005) Information security governance: CobiT or ISO 17799 or both?. Computers and Security 24: 99-104.
Swindle O, Conner B (2004) The link between information security and corporate governance. Computerworld.
Tudor JK (2000) Information security architecture: an integrated approach to security in the organization. Auerbach, New York.
Vallabhaneni R (2000) CISSP examination textbooks. SRV Professional Publications, Los Angeles.
Weill P, Woodham R (2002) Don’t just lead, govern: implementing effective IT governance. Center for Information Systems Research, Sloan School of Management, Massachusetts Institute of Technology in Cambridge.
Witty RJ, Girard J, Graff JW, Hallawell A, Hildreth B, MacDonald N, Malik WJ, Pescatore J, Reynolds M, Russell K, Wheatman V, Dubiel JP, Weintraub A (2001) The price of information security. Gartner Inc., Stamford.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kim, S. (2007). Governance of Information Security: New Paradigm of Security Management. In: Nedjah, N., Abraham, A., Mourelle, L.d.M. (eds) Computational Intelligence in Information Assurance and Security. Studies in Computational Intelligence, vol 57. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71078-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-71078-3_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71077-6
Online ISBN: 978-3-540-71078-3
eBook Packages: EngineeringEngineering (R0)