Title page for etd-0717117-212100


[Back to Results | New Search]

URN etd-0717117-212100
Author Yu-Jen Tsao
Author's Email Address No Public.
Statistics This thesis had been viewed 5354 times. Download 746 times.
Department Information Management
Year 2016
Semester 2
Degree Master
Type of Document
Language zh-TW.Big5 Chinese
Title The effect of Information Security Management System in Hospitals on the Maturity of Information Security
Date of Defense 2017-07-27
Page Count 82
Keyword
  • Conflict
  • Information Security Policy
  • Information Security Maturity
  • Information Security Management System
  • Coordination Mechanism
  • Information Security Management Acceptance
  • Abstract In recent years, with the advancement and development of information technology, the issue of information security has become the most important of hospitals. Taking the hospital for example, whether the service is interrupted or data is leaked, it will damage people’s lives or health, or the image of the hospital. In recent years, security incidents continue to occur, for the protection of information assets within maintain the computer operation, information security management system (ISMS) is a set of effective control and management methods. Commonly it used ISO standard call “ISO 27001”, for the organization to use of information, hardware, users and assets to achieve “confidentiality”、 “Integrity” and “availability” .
       Most of previous studies of information security management focused on information security management and evaluation, but there were no methods for making information security maturity advanced and no analyses of factors that influenced on information security maturity. We had little information from previous studies if there would be conflict because of members of the organizations had different information security management acceptance, and then, this conflict would influence on executing and preserving the information security policy. Meanwhile, we also have little information if information security policy would influence on coordination mechanism and information security maturity, and the conflicts among organization members would influence on the coordination mechanism, and then influenced on information security maturity. We focused on information security and used technology acceptance model to deduce the acceptance of information security and we used the perspective of coordination mechanism to see how coordination influenced on information security maturity.
      We used LISREL and SPSS to do path analysis, and found that both of information security management acceptance differences and conflicts among members would influence on the information security policy made by organization, meanwhile, they also influenced on the organization coordination systems. Information security maturity would be influenced by the organization coordination system and information security policy. Information security management acceptance did not show a significant correlation with conflicts among the members. But according to the results of interviews, we found that information security management acceptance also influenced on organization conflicts in user’s view. Furthermore, we provided some information security management related points in helping organization information security maturity advanced and also provided some references for further studies.
    Advisory Committee
  • Yi-Ling Lin - chair
  • Shih-Chieh Hsu - co-chair
  • Hsin-Hui Lin - advisor
  • Files
  • etd-0717117-212100.pdf
  • indicate access worldwide
    Date of Submission 2017-08-17

    [Back to Results | New Search]


    Browse | Search All Available ETDs

    If you have more questions or technical problems, please contact eThesys