• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

論我國導入貿易雲之資訊安全風險暨法規因應 / The study of information security risks and related legal instruments on the cloud computing of international trade

董玉潔, Tung, Yu Chieh Unknown Date (has links)
近年來,雲端運算成為我國貿易商理想的電子商務模式。雲端運算基本概念為將資訊和資源集中存放在「雲」上,透過網路服務提供資源,幫助企業提升效率、降低運籌成本。然而,雲端運算的原理造成使用者將資訊存放在網路之某處,使用者無法直接控制其資料,進而衍生出資訊安全之疑慮。也因此,當企業決定是否導入雲端運算時,往往將資訊安全納入考量。若欲鼓勵我國貿易商導入雲端運算,分析資訊安全風險、了解如何管理這類風險,係有其必要性。 本研究主要目的,係為我國貿易商提供較清晰之雲端運算資訊安全分析,包含雲端運算可能之資訊安全風險,以及管理這些風險的方式。依本研究比較分析之結果,雲端運算資訊安全風險與其他電腦或網路產品、服務之資訊安全風險類似,並可透過技術、管理與法律以降低風險。然而資訊安全風險無法被完全去除,在此情況下,貿易商宜透過契約保障其資訊本身、以及相關權利。 / In recent years, cloud computing has become an ideal way for most Taiwanese trading companies to adopt e-commerce. The basic model of cloud computing is to provide resource in the form of internet service. By centralizing data and resource onto “the cloud”, cloud computing helps companies to improve efficiency with lower budget. However, this approach raises concern about information security, for users’ data will be stored in the internet, rather than being directly controlled by the users. Due to this fact, companies tend to take information security into consideration before moving to the cloud. To encourage Taiwanese trading companies, analyzing and learning how to manage the information security risks are rather necessary. This research aims to provide a clearer view of the information security to Taiwanese trading companies, including the possible information security risks and the ways to manage these risks. Through comparison and analysis, we conclude that the information security risks of cloud computing and of other computer or internet products or service are similar, and these risks can be reduced by technical methods, management and laws. However, these risks cannot be removed, and in this situation, trading companies are suggested to protect their data and their rights via contracts.

Page generated in 0.1277 seconds