Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A study on the information technology security review process in finance

Full metadata record
DC Field Value Language
dc.contributor.authorHong, Y.-
dc.contributor.authorKim, D.-
dc.date.available2019-04-10T10:15:35Z-
dc.date.created2018-04-17-
dc.date.issued2015-
dc.identifier.isbn9781450334617-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32654-
dc.description.abstractIt is better to adapt IT security review in all the system development. However, it is almost impossible to do this because of the cost problem. In this paper, we sorted the system by its character such as the data and investment size. This sorting can be used as a standard for adapting IT security review. Though it is necessary to review the security functions and requirement from the analysis · design level, this process is ignored in most of the system development. In the important system, this security review has been compulsory in Korean finance. Especially Financial supervisory service in Korea announced that all of financial companies have to review the IT security task whenever they do the IT system development on the base of compliance named 'Electronic finance supervisory rule'. Is it necessary to adapt the strong review process in every IT system? In this paper, we show this standard. For this, we sorted the IT system in 4 models and made the review process. This standard can play a role in deciding whether the very system development should get the strong security review or not. This trial is expected to help other financial companies make decisions whether the process of IT security review should be strong or not. This can save the cost by adapting the strong security review only in the important system development. © 2015 Copyright held by the owner/author(s). Publication rights licensed to ACM.-
dc.publisherAssociation for Computing Machinery-
dc.relation.isPartOfACM International Conference Proceeding Series-
dc.titleA study on the information technology security review process in finance-
dc.typeConference-
dc.identifier.doi10.1145/2781562.2781607-
dc.type.rimsCONF-
dc.identifier.bibliographicCitation17th Annual International Conference on Electronic Commerce, ICEC 2015, v.03-05-August-2015-
dc.description.journalClass2-
dc.identifier.scopusid2-s2.0-84957818311-
dc.citation.conferenceDate2015-08-03-
dc.citation.title17th Annual International Conference on Electronic Commerce, ICEC 2015-
dc.citation.volume03-05-August-2015-
dc.contributor.affiliatedAuthorKim, D.-
dc.type.docTypeConference Paper-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Industrial & Information Systems Engineering > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Dongsoo photo

Kim, Dongsoo
College of Engineering (Department of Industrial & Information Systems Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE