Browse > Article
http://dx.doi.org/10.7838/jsebs.2014.19.2.109

Correlation Analysis in Information Security Checklist Based on Knowledge Network  

Jin, Chang Young (CIST(Center for Information Security and Technologies), Korea University)
Kim, Ae Chan (CIST(Center for Information Security and Technologies), Korea University)
Lim, Jong In (CIST(Center for Information Security and Technologies), Korea University)
Publication Information
The Journal of Society for e-Business Studies / v.19, no.2, 2014 , pp. 109-124 More about this Journal
Abstract
As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, 'FSS', 'FISS', 'G') are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, 'FSS', 'FISS'and 'G'.
Keywords
Information Security Checklist; Knowledge Network Analysis;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 TTA, TTAK.KO-12.0093, A Guide to Establishing Information Security Policies of Organization, Dec 2008.
2 White, H. D., "Pathfinder networks and author cocitation analysis : A remapping of paradigmatic information scientists," Journal of the American Society for Information Science and Technology, Vol. 54, No. 5, pp. 423-434, 2003.   DOI   ScienceOn
3 Wi, C. K., Kim, H. J., and Lee, S. J., "A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 4, pp. 851-868, 2012.   과학기술학회마을
4 Won, D. K. et al., Development and implementation of knowledge Map in academic social science research area, Korea Institute of Science and Technology Information Research Report, 2009.
5 Wikipedia, "Power law," http://en.wikipedia.org/wiki/Power_law.
6 Wikipedia, "NIACAP," http://en.wikipedia.org/wiki/NIACAP.
7 Lee, S. S., Network Analysis Methodology. Social Science Research Institute, Pusan National University Studies series, Vol. 2, Seoul, 2012.
8 Kim, A. C., Lee, S. M., and Lee, D. H., "Compliance Risk Assessment Measures of Financial Information Security using System Dynamics," IJSIA(International Journal of Security and Its Applications), Vol. 6, No. 4, pp. 191-200, 2012.
9 Kim, K. C. and Kim, S. J., "Evaluation Criteria for Korean Smart Grid based on K-ISMS," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 6, pp. 1375-1391, 2012.   과학기술학회마을
10 Kim, K. C., Heo, O., and Kim, S. J., "A Security Evaluation Criteria for Korean Cloud Computing Service," Journal of The Korea Institute of Information Security and Cryptology, Vol. 23, No. 2, pp. 251-265, 2013.   과학기술학회마을   DOI   ScienceOn
11 Kim, Y. H., Yoon, J. R., Cho, H. S., and Kim, Y. J., "Structure of Collaboration Network among Korean Scientists-'Small World' and Position Effect," Korea Journal of Sociology, Vol. 41, No. 4, pp. 68-103, 2007.
12 NIST, SP 800-53, Recommended Security Controls for Federal Information Systems, Oct 2003.
13 Park, H. W. and Loet Leydesdorff., "Kr-Kwic for Korean content analysis and understanding of the applicable program," Journal of the Korean Data Analysis Society, Vol. 6, No. 5, pp. 1377-1387, 2004.
14 Jang, S. O. and Lim, J. I., "Developing key Performance Indicators for Financial IT Security," The Journal of Society for e-Business Studies, Vol. 18, No. 3, pp. 125-142, 2013.   과학기술학회마을   DOI
15 Popping, R., Computer-assisted Text Analysis. London, Sage Publications, 2000.
16 Shim, J. S. and Kim, J. S., "Understanding Conflict Frames about a Nuclear Power Plant : Focusing on the Effect of the Fukushima Nuclear Accident," The Journal of Korea Public Administration, Vol. 45, No. 3, pp. 173-202, 2011.
17 Choi, Y. C. and Park, S. J., "Trend Analysis on Public Administration Research : Applications of Network Text Analysis methods," The Journal of Korea Public Administration, Vol. 45, No. 1, pp. 123-139, 2011.
18 Jeong, J. H. and Kim, D. W., "A research on the methods and target of privacy risk in smart social," Korea Journal of Local Information Society, Vol. 16, No. 3, pp. 113-136, 2013.