Browse > Article

An Empirical Study on the Effects of Business Performance by Information Security Management System(ISMS)  

Jang, Sang Soo (한국인터넷진흥원)
Kim, Sang Choon (강원대학교/전자정보통신공학부)
Publication Information
Abstract
Since 2002, information security management system has been implemented (ISMS) certification scheme whilst providing telecommunications services to enhance the level of enterprise information security was ongoing and Prevent accidents and avoid spread of infringement, such as rapid response and there is a lot of it came true. However, this system is the protection of the country or the investment company, as part of the actual information on how management affects the performance came from or how measures are still lacking for. In this study, the companies have their own privacy ISMS certification measures the level of activity continued to improve information security performance measures and methodology are presented. The government is also based on the validity of the certification system to ensure the overall implementation of the ISMS itself is this a step increase effective information security system is to be certified in advance to prevent security incidents and to improve business performance to help.
Keywords
ISMS; certification scheme; ISMS performance measures; certification system; management affects;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 김영일, 이재훈, "개인정보보호투자의 성과측정방안에 관한 연구", 디지털융복합연구 제11권 제1호 (2013년 1월) pp.99-106, 2013.   DOI
2 김선양, "품질경영시스템이 기업성과에 미치는 영향에 관한 연구 : QMS인증 중소기업을 중심으로", 한양대학교 석사학위논문, 2005.
3 박대하, 이재훈, "개인정보보호 투자 성과측정 방안 선정에 관한 연구", 정보보호학회논문지 제22권 제6호 (2012년 10월) pp.15-21, 2012.
4 선한길, "국내기업의 정보보호 정책 및 조직 요인이 정보보호성과에 미치는 영향", 한국경영정보학회 춘계학술대회 논문집, pp.1087-1095, 2005.
5 신일순, "정보보호의 경제학적 의미에 대한 소고", Information Security Review, 제1호, 제1권, pp.27-40, 2005.
6 한국인터넷진흥원, "정보보호 관리체계(ISMS)인증의 경제적 효과 분석", 인터넷진흥원, 인터넷 & 시큐리티 이슈 제 2호. 2010.
7 Bodin, L.D., L.A and Loed, M.P., "Evaluating information security investment using the analytic hierarchy process," Communication of theACM, Vol.11, No3, pp.431-448, 2005.
8 Tsiakis, T. and S., George, "The economic approach of information security," Computers & Security, Vol. 24, No.2, pp105-108, 2005.   DOI