請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/10791
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 許瑋元(Wei-Yuan Hsu) | |
dc.contributor.author | Chen-Chieh Chung | en |
dc.contributor.author | 鍾振杰 | zh_TW |
dc.date.accessioned | 2021-05-20T21:59:08Z | - |
dc.date.available | 2012-07-22 | |
dc.date.available | 2021-05-20T21:59:08Z | - |
dc.date.copyright | 2010-07-22 | |
dc.date.issued | 2010 | |
dc.date.submitted | 2010-07-18 | |
dc.identifier.citation | Adams, D., Nelson, R., & Todd, P. (1992). Perceived usefulness, ease of use, and usage of information technology: a replication. MIS Quarterly, 16(2), 227-247.
Anderson, J., & Gerbing, D. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological bulletin, 103(3), 411-423. Attewell, P. (1992). Technology diffusion and organizational learning: The case of business computing. Organization science, 3(1), 1-19. Basel, II. (2004). Basel II: International Convergence of Capital Measurement and Capital Standards: A Revised Framework: Basel Committee Publications. Bentler, P. (2006). EQS 6 structural equations modeling program manual. California: Multivariate Software. Bentler, P., & Bonett, D. (1980). Significance tests and goodness of fit in the analysis of covariance structures. Psychological bulletin, 88(3), 588-606. Bidgoli, H. (2006). Handbook of Information Security Volume 1-3. New Jersey: John Wiley & Sons. Bjorck, F. (2004). Institutional theory: a new perspective for research into IS/IT security in organisations. Paper presented at the The 37th Annual Hawaii International Conference on Information Systems 2004 (HICSS'04). Blakley, B., McDermott, E., & Geer, D. (2001). Information security is information risk management. Paper presented at the workshop on New security paradigms. Blunch, N. (2008). Introduction to structural equation modelling using SPSS and AMOS. California: Sage. Bodin, L., Gordon, L., & Loeb, M. (2008). Information security and risk management. Communications of the ACM, 51(4), 64-68. Bollen, K. (1989). Structural equations with latent variables. New Jersey: John Wiley & Sons. Brenner, J. (2007). ISO 27001: Risk management and compliance. Risk Management Magazine, 54, 24-29. Byrne, B. (2006). Structural equation modeling with EQS: Basic concepts, applications, and programming. New Jersey: Lawrence Erlbaum Associates. Cavusoglu, H., Mishra, B., & Raghunathan, S. (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16(1), 28-46. Cerullo, V., & Cerullo, M. (2004). Business continuity planning: A comprehensive approach. Information Systems Management, 21(3), 70-78. Chatterjee, D., Grewal, R., & Sambamurthy, V. (2002). Shaping Up For E-Commerce:Institutional Enables of The Organisational Assimilation Web Technologies. MIS Quarterly, 26(2), 65-89. Chen, A., Watson, R., Boudreau, M., & Karahanna, E. (2009). Organizational Adoption of Green IS & IT: An Institutional Perspective. Paper presented at the 30th IInternational Conference on Information Sytems (ICIS 2009), Phoenix. Chen, T., Chung, Y., & Huang, G. (2003). Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. Computers & Security, 22(6), 527-534. Chin, W., & Gopal, A. (1995). Adoption intention in GSS: relative importance of beliefs. ACM SIGMIS Database, 26(2&3), 42-64. Churchill, G. A. (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16(1), 64-73. Cooper, R., & Zmud, R. (1990). Information technology implementation research: a technological diffusion approach. Management Science, 36(2), 123-139. Cronbach, L. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297-334. Culnan, M. J., & Williams, C. C. (2009). How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches. MIS Quarterly, 33(4), 673-687. D'Arcy, J., & Hovav, A. (2008). An Integrative Framework for the Study of Information Security Management Research. In J. N. D. Gupta & S. K. Sharma (Eds.), Handbook of Research on Information Security and Assurance (pp. 55-67). Pennsylvania: IGI Global. D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79-98. Damanpour, F. (1991). Organisational Innovation: A Meta-Analysis of Effects of Determinants and Moderators. Academy of Management Journal, 34(3), 555-590. Damanpour, F. (1992). Organizational size and innovation. Organization studies, 13(3), 375. Delmas, M. (2002). The diffusion of environmental management standards in Europe and in the United States: an institutional perspective. Policy Sciences, 35, 91-119. Dhillon, G., & Backhouse, J. (2001). Current Directions in IS Security Research: Towards Socio-Organisational Perspectives. Information Systems Journal, 11(2), 127-153. Dickerson, M., & Gentry, J. (1983). Characteristics of adopters and non-adopters of home computers. Journal of Consumer Research, 10(2), 225-235. DiMaggio, P. J., & Powell, W. W. (1983). The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality in Organisational Fields. American Sociological Review, 48(2), 147-160. Dinev, T., Goo, J., Hu, Q., & Nam, K. (2008). User behaviour towards protective information technologies: the role of national cultural differences. Information Systems Journal, 19(4), 391-412. Downs Jr, G., & Mohr, L. (1976). Conceptual issues in the study of innovation. Administrative Science Quarterly, 21(4), 700-714. DTI/PWC. (2008). Safeguarding the new currency of business - Findings from the 2008 Global State of Information Security Study. E&Y. (2008). Moving beyond compliance - Ernst & Young's 2008 Global Information Security Survey. Eloff, J., & Eloff, M. (2003). Information security management: a new paradigm. Paper presented at the annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology. Ezingeard, J., & Birchall, D. (2005). Information security standards: Adoption drivers (invited paper). Paper presented at the Security management, integrity, and internal control in information systems. Fenz, S., Goluch, G., Ekelhart, A., Riedl, B., & Weippl, E. (2007). Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. Paper presented at the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'07), Victoria. Fischer, P. (2007). Security Evaluation and Testing Past, Present and Future. In Sacher Paulus, Norbert Pohlmann & H. Reimer (Eds.), ISSE 2004 - Securing Electronic Business Processes: Highlights Of The Information Security Solutions Europe 2004 Conference (pp. 322 -328): Vieweg. Fombrun, C., & Shanley, M. (1990). What's in a name? Reputation building and corporate strategy. Academy of Management Journal, 33(2), 233-258. Fornell, C., & Larcker, D. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. Frost, P., & Egri, C. (1991). The political process of innovation. Research in organizational behavior, 13, 229-245. Gibb, F., & Buchanan, S. (2006). A framework for business continuity management. International Journal of Information Management, 26(2), 128-141. Gopal, R., & Sanders, G. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29-47. Gordon, L., & Loeb, M. (2002). The economics of information security investment. ACM Transactions on Information and System Security (TISSEC), 5(4), 438-457. Guler, I., Guillen, M., & Macpherson, J. (2002). Global Competition Institutions, and the Diffusion of Organsational Practices: The International Spread of ISO 9000 Quality Certificates. Administrative Science Quarterly, 47(2), 207-223. Gupta, B. B., Joshi, R. C., & Misra, M. (2009). An efficient analytical solution to thwart DDoS attacks in public domain. Paper presented at the International Conference on Advances in Computing, Communication and Control. Gupta, J., & Sharma, S. (2008). Handbook of Research on Information Security and Assurance. Pennsylvania: Information Science Reference. Gupta, M., & Sharman, R. (2009). Social and Human Elements of Information Security: Emerging Trends and Countermeasures. Pennsylvania: Information Science Reference. Hair, J., Anderson, R., Tatham, R., & Black, W. (1995). Multivariate data analysis: with readings. New Jersey: Prentice-Hall. Hair, J., Black, W., Babin, B., Anderson, R., & Tatham, R. (2006). Multivariate Data Analysis. New Jersey: Prentice Hall. Harn, L., & Ren, J. (2006). Efficient identity-based RSA multisignatures. Computers & Security, 27(1-2), 12-15. Haunschild, P., & Miner, A. (1997). Modes of Interorganizational Imitation: The Effects of Outcome Salience and Uncertainty. Administrative Science Quarterly, 42(3), 472-500. Hawley, A. H. (1986). Human ecology: A theoretical essay. Chicago: University of Chicago Press. Hoyle, R., & Panter, A. (1995). Writing about structural equation models. In R. H. Hoyle (Ed.), Structural equation modeling: Concepts, issues, and applications (pp. 158-176). California: : Sage. Hsu, C., Lee, J.-N., & Straub, D. W. (2010). Institutional Influences on Information Security Innovations. Working paper. Hsu, C., Lu, H., & Hsu, H. (2007). Adoption of the mobile Internet: An empirical study of multimedia message service (MMS). Omega, 35(6), 715-726. Hu, L., & Bentler, P. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1-55. Iacovou, C. L., Benbasat, I., & Dexter, A. S. (1995). Electronic data interchange and small organizations: adoption and impact of technology. MIS Quarterly, 19(4), 465-485. ISO, B. S. (2005a). ISO/IEC 27001: 2005, Information Technology - Security Techniques - Information Security Management Systems - Requirements. ISO, B. S. (2005b). ISO/IEC 27002: 2005, Information Technology. Security Techniques. Code of Practice for Information Security Management. ISO, B. S. (2008). ISO/IEC 27005: 2008, Information Technology - Security Techniques - Information Security Risk Management. Joreskog, K., & Sorbom, D. (1993). LISREL 8: Structural equation modeling with the SIMPLIS command language. Illinois: Scientific Software. Jain, A. K., Ross, A., & Pankanti, S. (2006). Biometrics: a tool for information security. IEEE transactions on information forensics and security, 1(2), 125-143. James, L., Mulaik, S., & Brett, J. (1982). Causal analysis: Assumptions, models, and data. New Jersey: Sage. Jeyaraj, A., Balser, D., Chowa, C., & Griggs, G. (2009). Organizational and institutional determinants of B2C adoption under shifting environments. Journal of Information Technology, 24(3), 219-230. Khalifa, M., & Davison, M. (2006). SME adoption of IT: the case of electronic trading systems. IEEE Transactions on Engineering Management, 53(2), 275-284. Kimberly, J., & Evanisko, M. (1981). Organisational Innovation: The Influence of Individual, Organisational, and Contextual Factors on Hospital Adoption of Technological and Administrative Innovations. Academy of Management Journal, 24(4), 689-713. Kline, R. (2005). Principles and practice of structural equation modeling. New York: The Guilford Press. Knapp, K. (2009). Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions. Pennsylvania: Information Science Reference. Knight, K. E. (1967). A descriptive model of the intra-firm innovation process. Journal of Business, 40, 478-496. Kotulic, A., & Clark, J. (2004). Why there aren't more information security research studies. Information & Management, 41(5), 597-607. Lai, V., Liu, C., Lai, F., & Wang, J. (2008). Examining ERP Committee Beliefs: A Comparison of Alternative Models. Paper presented at the International Conference on Information Systems (ICIS) 2008. Li, M. (2006). Change trend of averaged Hurst parameter of traffic under DDOS flood attacks. Computers & Security, 25(3), 213-220. Liang, H., Saraf, N., Hu, Q., & Xue, Y. (2007). Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management. MIS Quarterly, 31(1), 59-87. Lyytinen, K. (1991). Penetration of information technology in organizations: A comparative study using stage models and transaction costs. Scandinavian journal of information systems, 3(1), 87-109. Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy signatures for delegating signing operation. Paper presented at the 3rd ACM conference on Computer and communications security, New Delhi. March, J. (1981). Decisions in organizations and theories of choice. In A. H. Van de Ven & W. F. Joyce (Eds.), Perspectives on organization design and behavior (pp. 205-244). New York: John Wiley & Sons Inc. Mardia, K. (1970). Measures of multivariate skewness and kurtosis with applications. Biometrika, 57(3), 519-530. Mardia, K. (1974). Applications of some measures of multivariate skewness and kurtosis in testing normality and robustness studies. Sankhy : The Indian Journal of Statistics, Series B, 36(2), 115-128. Maruyama, G. (1997). Basics of structural equation modeling. New Jersey: Sage Publications. McDonald, R., & Marsh, H. (1990). Choosing a multivariate model: Noncentrality and goodness of fit. Psychological bulletin, 107(2), 247-255. Mellado, D., Fernandez-Medina, E., & Piattini, M. (2007). A common criteria based security requirements engineering process for the development of secure information systems. Computer Standards & Interfaces, 29(2), 244-253. Meyer, A., & Goes, J. (1988). Organizational assimilation of innovations: a multilevel contextual analysis. Academy of Management Journal, 31(4), 897-923. Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony. American journal of sociology, 83(2), 340-363. Nunnally, J., & Bernstein, I. (1978). Psychometric theory. New York: McGraw-Hill. Nunnally, J., Bernstein, I., & Berge, J. (1994). Psychometric theory. New York: McGraw-Hill O'Callaghan, R., Kaufmann, P., & Konsynski, B. (1992). Adoption correlates and share effects of electronic data interchange systems in marketing channels. Journal of Marketing, 56(2), 45-56. Plouffe, C., Hulland, J., & Vandenbosch, M. (2001). Richness versus parsimony in modeling technology adoption decisions--understanding merchant adoption of a smart card-based payment system. Information Systems Research, 12(2), 208-222. Prescott, M. B., & Conger, S. A. (1995). Information technology innovations: a classification by IT locus of impact and research approach. ACM SIGMIS Database, 26(2-3), 20-41. Ramamurthy, K., Sen, A., & Sinha, A. (2008). An empirical investigation of the key determinants of data warehouse adoption. Decision Support Systems, 44(4), 817-841. Richardson, R. (2008). CSI/FBI Computer Crime and Security Survey 2008. Rogers, E. M. (1995). Diffusion of innovations. New York: Free Press. Rogers, E. M. (2003). Diffusion of innovations: New York: Free Press. Rowe, L. A., & Boise, W. B. (1974). Organizational innovation: Current research and evolving concepts. Public Administration Review, 34(3), 284-293. Schultz, E. E. (2004). Sarbanes-Oxley - a huge boon to information security in the US. Computers & Security, 23(5), 353-354. Schumacker, R., & Lomax, R. (2004). A beginner's guide to structural equation modeling. New Jersey: Lawrence Erlbaum Associates. Scott, W. R. (2001). Institutions and organizations. California: Sage. Siponen, M., & Willison, R. (2007). A critical assessment of IS security research between 1990-2004. Paper presented at the 15th European Conference on Information Systems, St. Gallen, Switzerland. Siponen, M. T., & Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. ACM SIGMIS Database, 38(1), 60-80. Smith, E., & Eloff, J. (2002). A Prototype for Assessing Information Technology Risks in Health Care. Computers & Security, 21(3), 266-284. Son, J., & Benbasat, I. (2007). Organizational Buyers' Adoption and Use of B2B Electronic Marketplaces: Efficiency-and Legitimacy-Oriented Perspectives. Journal of Management Information Systems, 24(1), 55-99. Stoneburner, G., Goguen, A., & Feringa, A. (2002). Risk management guide for information technology systems: NIST special publication. Straub, D. W. (1990). Effective IS Security. Information Systems Research, 1(3), 255-276. Sumner, M. (2009). Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness. Information Systems Management, 26(1), 2-12. Sun, L., Srivastava, R., & Mock, T. (2006). An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22(4), 109-142. Tan, M., & Teo, T. (2000). Factors influencing the adoption of Internet banking. Journal of the AIS, 1(1es). Tanaka, J. (1993). Multifaceted conceptions of fit in structural equation models. In K. A. Bollen & J. S. Long (Eds.), Testing structural equation models (pp. 10-39). California: Sage. Taylor, S., & Todd, P. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176. Teo, H., Tan, B., & Wei, K. (1995). Innovation diffusion theory as a predictor of adoption intention for financial EDI. Paper presented at the International Conference on Information Systems (ICIS). Teo, H. H., Wei, K. K., & Benbasat, I. (2003). Predicting Intention to Adopt Interorganisational Linkage: An Institutional Perspective. MIS Quarterly, 27(1), 19-49. Teo, T., Lim, G., & Fedric, S. (2007). The adoption and diffusion of human resources information systems in Singapore. Asia Pacific Journal of Human Resources, 45(1), 44. Tierney, J. (2008). Common Criteria A brief history and overview. In K. E. Mayes & K. Markantonakis (Eds.), Smart Cards, Tokens, Security and Applications (pp. 173-194). Berlin Springer. Tipton, H., & Krause, M. (2007). Information Security Management Handbook. Florida: CRC Press. Tornatzky, L., & Klein, K. (1982). Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings. IEEE Transactions on Engineering Management, 29(1), 28-45. Tsipenyuk, K., Chess, B., & McGraw, G. (2005). Seven pernicious kingdoms: A taxonomy of software security errors. IEEE Security & Privacy, 3(6), 81-84. Vacca, J. (2009). Computer and information security handbook. Massachusetts: Morgan Kaufmann. von Solms, B. (2000). Information security- the third wave? Computers & Security, 19(7), 615-620. von Solms, B., & von Solms, R. (2004). The 10 deadly sins of information security management. Computers & Security, 23(5), 371-376. von Solms, R. (1999). Information security management: why standards are important. Information Management & Computer Security, 7(1), 50-57. Wang, H., & Wang, C. (2003). Taxonomy of security considerations and software quality. Communications of the ACM, 46(6), 75-78. Weingart, S. H. (Ed.). (2000). Physical security devices for computer subsystems: A survey of attacks and defenses. West, S., Finch, J., & Curran, P. (1995). Structural equation models with nonnormal variables: Problems and remedies. In R. Hoyle (Ed.), Structural Equation Modeling: Concepts, Issues, and Applications (pp. 56–75). California: Sage. Westphal, J., Gulati, R., & Shortell, S. (1997). Customisation or Conformity? An Institutional and Network Perspective on the Content and Consequences of TQM Adoption. Administrative Science Quarterly, 42, 366-394. Whitman, M. E., & Mattord, H. J. (2008). Principles of information security. Massachusetts: Course Technology. Xu, J., & Lee, W. (2003). Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers, 52(2), 195-208. Zhu, K., Dong, S., Xu, S., & Kraemer, K. (2006). Innovation diffusion in global contexts: determinants of post-adoption digital transformation of European companies. European Journal of Information Systems, 15(6), 601-616. Zmud, R. (1984). An examination of'push-pull'theory applied to process innovation in knowledge work. Management Science, 30(6), 727-738. Zucker, L. (1977). The role of institutionalization in cultural persistence. American Sociological Review, 42(5), 726-743. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/10791 | - |
dc.description.abstract | 近年來,由於資訊安全事件對於組織的衝擊,使得資訊安全對於組織而言,其重要性不斷的攀升。改善其資訊安全的控制及管理,對於各種組織來說都是致關重要的。而在資訊安全管理領域當中,對於組織欲強化其資訊安全管理,ISO 27001一直扮演著重要的角色,然而在過去的文獻當中,對於ISO 27001的研究卻非常有限,而且幾乎沒有任何學術針對ISO 27001採用意圖作一深入的研究。因此我們結合了兩個過去經常被使用來研究採用意圖的重要理論,即創新擴散理論及制度理論,來發展我們的研究模型,並且收集了52個台灣的組織的資料來驗證此一模型。分析結果顯示ISO 27001的複雜性及台灣制度環境上的壓力,對於組織採用ISO 27001意圖的高低,具有顯著的影響力。本研究結果為學術上缺乏對於ISO 27001採用意圖的研究,做了一部分的補充,並且可以提供實務上組織在採用ISO 27001時的一個參考。此外,本研究亦使創新擴散理論及制度理論的文獻進一步延伸至資訊安全管理此一領域。 | zh_TW |
dc.description.abstract | Since the importance of information security and its severe impacts on organizations, the improvements of information security controls as well as managements are crucial for all organizations. For the information security management, ISO 27001 is the most important standards and it plays an important role while the organizations are considering strengthening their security management. However, there are scanty of academic researches focus on the ISO 27001 issues and nearly no researches were studying the adoption intentions of ISO 27001. Therefore we develop the research model from two theories, and the hypothesized research model is tested using empirically data collect from 52 organizations in Taiwan. The results suggest that complexity and institutional influences have a strong impact on the adoption intention of ISO 27001. This study provides several implications on both academic and practical. It also extended the empirical literature of institutional and innovation diffusion studies to the area of information security. | en |
dc.description.provenance | Made available in DSpace on 2021-05-20T21:59:08Z (GMT). No. of bitstreams: 1 ntu-99-R97725048-1.pdf: 1470375 bytes, checksum: 325e853449296efed75e33f743dc3dca (MD5) Previous issue date: 2010 | en |
dc.description.tableofcontents | Abstract v
List of Tables viii List of Figures ix Chapter 1 Research Issues 1 1.1 Motivation and the Scope of the Research 1 1.2 Research Question and Objectives 9 1.3 Structure of the Thesis 9 Chapter 2 Literature Review 11 2.1 Information Security Technologies 12 2.2 Information Security Management 16 2.3 Implications for current status of information security research 21 Chapter 3 Research Framework 23 3.1 Administrative Innovation 23 3.2 Diffusion of Innovations Theory 25 3.3 Institutional Theory 28 3.4 Research Model 30 3.4.1 Relative Advantage 30 3.4.2 Compatibility 31 3.4.3 Complexity 31 3.4.4 Coercive Pressures 31 3.4.5 Mimetic Pressures 32 3.4.6 Normative Pressures 34 Chapter 4 Research Design 37 4.1 Measures 37 4.1.1 Independent Variables 37 4.1.2 Dependent Variable 40 4.2 Control Variables 42 4.3 Data Collection and Sample 43 4.4 Analysis Method 45 Chapter 5 Results and Discussions 48 5.1 Sample Characteristics 48 5.2 Descriptive Statistics and Reliability and Validity Assessment 49 5.2.1 Reliability 52 5.2.2 Validity 52 5.3 Normality Checking, Model Fitting and Hypotheses Testing 54 5.3.1 Normality Checking 55 5.3.2 Model Fitting and Hypotheses Testing 58 5.4 Discussions 66 Chapter 6 Conclusion 72 6.1 Implications for theory and practice 72 6.2 Limitations and Suggestions for future research 73 6.3 Concluding Comments 75 References 77 Appendix A. Researches on IS Security 90 Appendix B. Questionnaire Instruments 93 | |
dc.language.iso | en | |
dc.title | ISO 27001 之採用 - 整合創新擴散及制度理論之角度 | zh_TW |
dc.title | ISO 27001 Adoption - Integrating Innovation Diffusion and Institutional Theories | en |
dc.type | Thesis | |
dc.date.schoolyear | 98-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 王大維(Ta-Wei Wang),張欣綠(Hsin-Lu Chang) | |
dc.subject.keyword | ISO 27001,資訊安全管理系統,採用意圖,管理創新,創新擴散理論,制度理論, | zh_TW |
dc.subject.keyword | ISO 27001,Information Security Management System,Adoption Intention,Administrative Innovation,Diffusion of Innovation Theory,Institutional Theory, | en |
dc.relation.page | 96 | |
dc.rights.note | 同意授權(全球公開) | |
dc.date.accepted | 2010-07-19 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-99-1.pdf | 1.44 MB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。