期刊文献+

信息安全外包领域研究热点与演化趋势分析

Analysis of Research Hotspots and Evolution Trends in the Field of Information Security Outsourcing
下载PDF
导出
摘要 信息安全外包研究脉络的梳理对指导企业科学制定信息安全外包策略至关重要。基于知识图谱技术,比较分析中英文文献研究热点和方向的异同。结果表明:该领域发文量经历了初步探索、推进研究、多元增长三个阶段;中文文献侧重不同行业主体的信息安全外包风险管理问题,英文文献侧重企业和用户的服务方案及隐私问题;未来可重点研究多学科融合的方法技术应用、个人用户的信息安全外包问题。 The research context of information security outsourcing is very important to guide enterprises to formulate information security outsourcing strategy scientifically.Based on knowledge graph technology,this paper compares and analyzes the similarities and differences between Chinese and English literatures.The results show that:the number of papers published in this field has experienced three stages:preliminary exploration,promoting research and diversified growth;the Chinese literature focuses on the risk management of information security outsourcing of different industry entities,and the English literature focuses on the service scheme and privacy of enterprises and users;in the future,we can focus on the application of multi-disciplinary integration methods and technologies and the information security outsourcing of individual users.
作者 李娇 赵柳榕 刘健楠 Li Jiao;Zhao Liurong;Liu Jiannan(School of Economics&Management,Nanjing Tech University,Nanjing Jiangsu 211816)
出处 《现代工业经济和信息化》 2023年第1期71-72,81,共3页 Modern Industrial Economy and Informationization
基金 国家自然科学基金项目“考虑风险依赖和竞争外部性的信息安全外包决策机制和策略优化研究”(71801125)。
关键词 信息安全外包 研究脉络 知识图谱 information security outsourcing research context knowledge map
  • 相关文献

参考文献3

二级参考文献43

  • 1吕俊杰,邱菀华,王元卓.基于相互依赖性的信息安全投资博弈[J].中国管理科学,2006,14(3):7-12. 被引量:14
  • 2吕俊杰,邱菀华,王元卓.网络安全投资外部性及博弈策略[J].北京航空航天大学学报,2006,32(12):1499-1502. 被引量:3
  • 3Gao X, Zhong W, Mei S. Information security investment when hackers disseminate knowledge[J]. Decision Analysis, 2013, 10(4):352-368.
  • 4Elhag S, Fernandez A, Bawakid A. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems[J]. Expert Systems with Applications, 2015, 42(1):193-202.
  • 5Huang C D, Behara R S. Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints[J]. International Journal of Production Economics, 2013, 141(1):255-268.
  • 6Elitzur R, Gavious A, Wensley A. Information systems outsourcing projects as a double moral hazard problem[J]. Omega, 2012, 40(3):379-389.
  • 7Bandyopadhyay T, Mookerjee V, Rao R C. Why IT managers don't go for cyberinsurance products[J]. Communications of the ACM, 2009, 52(11):68-73.
  • 8Ogut H, Menon N, Raghunathan S. Cyber security risk management:Public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection[J]. Risk Analysis, 2011, 31(3):497-512.
  • 9Lee C, Geng X, Raghunathan S. Contracting information security in the presence of double moral hazard[J]. Information Systems Research, 2013, 24(2):295-311.
  • 10Hui K, Hui W, Wei T, et al. Information security outsourcing with system interdependency and mandatory security requirement[J]. Journal of Management Information Systems, 2013, 29(3):117-155.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部