Browse > Article
http://dx.doi.org/10.12673/jant.2011.15.3.462

A Exploratory Study of Confidential Document Circulation System Design  

Chang, Hang-Bae (Department of Business Administration, Daejin University)
Kim, Heung-Gook (Department of Business Administration, Daejin University)
Abstract
Since, Davis(1991) has proposed the TAM(Technology Acceptance Model) through a literature review of informatization promotion, which insists that a user conveniency is judged by the degree of effectiveness caused by IT, the advancement of IT such as the Internet, e-mail, electronic data exchange, and groupware have brought into various changes in ordinary corporations and public institutions. However, with the right function, the advancement of IT has provided various benefits including additional reverse functions. Based on an integrated environment of business process, unauthorized user could access to information and a management of information becomes more difficult than before due to informatization of critical information. Furthermore, external hacking or information leakage by insider becomes easier owing to advancement in communication technology. This study has tried to develop a specified management procedure and implementation method for confidential documents.
Keywords
Confidential Document; Circulation System; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Arzi. Z., "Integrating a Key Cryptosystem into the Digital Signature Standard", Electronic Letters, Vol. 29, 1994.
2 Farley, M., T. Stearns, and J. Hsu, Data Integrity and Security, Triangle, 1997.
3 Garfingel, S., Spafford, G., Practical Unix and Internet Security, 2nd Ed., Initech, 1996.
4 Whilliam, S., Internet Securities, B&C Press, 1995.
5 Howard JD. "An Analysis of Security Incidents on the Internet", Ph. D Thesis, Carnegie Mellon University, 1997.
6 Jan-Martin Lowendahl, "Case Study: How to Use a Security Incident to Your Advantage (Lesions Learned at Goteborg University)", Gartner Industry Research, 2007
7 Kristen Noakers-Fry, Richard Hunter, "Case Study: Information Security Governance at TeliaSonera", Gartner Research, 2006.
8 Mark Nicolett, Jeffrey Wheatman, "DAM Technology Provides Monitoring and Analytics With Less Overhead", Gartner Research, 2007.