调停 发表于 2025-3-21 18:14:05

书目名称Managing Information System Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0623073<br><br>        <br><br>书目名称Managing Information System Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0623073<br><br>        <br><br>

Irascible 发表于 2025-3-21 22:47:06

http://reply.papertrans.cn/63/6231/623073/623073_2.png

probate 发表于 2025-3-22 03:16:42

http://reply.papertrans.cn/63/6231/623073/623073_3.png

hurricane 发表于 2025-3-22 07:18:46

The case of managing IS and security in a Local Council,he time of the study there was an initiative within the Council to introduce a ‘federal’ IT infrastructure. This was happening amidst increased socio-political and economic pressures. Indeed the case study was selected because of the ongoing change programme.

刚毅 发表于 2025-3-22 10:53:06

Principles for managing information system security,erately avoid considering problems as a consequence of a systems function. They are viewed as an emergent property of reflexive interaction between a system and its context. Four major themes are identified: the security policy itself; evaluation of security; design considerations in security; implementing information system security.

波动 发表于 2025-3-22 16:21:28

Conclusion, to bring together some key ideas and identify the contributions of this book. Concepts about the nature of information system security, the management of information system security and the crisis regarding the use of technology are presented.

珍奇 发表于 2025-3-22 20:40:45

The case of managing IS and security in a Hospital Trust, and the existing ones changed. Indeed, the case study was selected primarily because of these factors. The analysis of these structures, formal and informal, provides insight into the management of information system security.

visceral-fat 发表于 2025-3-22 23:46:44

http://reply.papertrans.cn/63/6231/623073/623073_8.png

Pericarditis 发表于 2025-3-23 02:14:11

A framework for interpreting the management of IS security,natural sciences. One indeed questions the appropriateness of these methods (Galliers 1991; 1993; Hirschheim 1985). This also raises questions as to how such methods will help a practitioner in the management of information system security.

欢腾 发表于 2025-3-23 07:23:41

Textbook 1997Latest editionThe book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions. The arguments are supported by case studies from the health care and local government sectors.
页: [1] 2 3 4 5
查看完整版本: Titlebook: Managing Information System Security; Gurpreet Dhillon Textbook 1997Latest edition Gurpreet Dhillon 1997 information system.security.syste