Skip to main content

Research into Information Security Strategy Practices for Commercial Banks in Taiwan

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 541))

Abstract

With the explosion of the internet, computers and networks have become an indispensable part of life, and due to the rise of E-commerce, enterprises can increase productivity and competitiveness via internet. All things related to the internet have produced new and inspiring opportunities in data access, commercial operations, and productivity. The recent big data, cloud computing, mobile commerce, internet, Blockchain, FinTech, and other network applications, as well as P2P transactions, all force electronic transaction patterns to undergo drastic change. The formulation of an information security strategy is of great importance to an organization’s success and continued existence.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Research, Development and Evaluation Commission: Executive Yuan, Risk Management Operation Manual Ver 3.0

    Google Scholar 

  • http://www.rdec.gov.tw/DO/DownloadControllerNDO.asp, 31 December 2013

  • Global Technology Audit Guideline (GTAG): The Institute of Internal Auditors-Chinese Taiwan, June 2011

    Google Scholar 

  • Li, P.C.: Discussion on IT Control Framework COBIT. Taiwan Stock Exchange Corporation, September 2009

    Google Scholar 

  • Hong, K.S., Chao, R.Y.: Discussion on the theory of information security management. Comments Inf. Manage. 12(6), 17–47 (2003)

    Google Scholar 

  • Liu, Y.L.: Formation mechanism and comprehensive evaluation of synergistic effect for virtual enterprises knowledge. Commer. Econ. 9, 99–101 (2009)

    Google Scholar 

  • Hang, G.M.: Analysis on high-level development strategy for bank information security. Agri. Dev. Financ., 1 (2006)

    Google Scholar 

  • Huang, K.P.: Discussion on requirement and application of ISO31000 risk management, Bimonthly on Development of Sustainable Industry, no. 53, December 2010

    Google Scholar 

  • Yu, S.W.: Risk management idea and framework for advanced Countries. National Central University (2007)

    Google Scholar 

  • Chen, C.M., Yeh, K.C.: The Late International Standards on Information Security Management–Brief Discussion on the Emphasis of New Version of ISO 27001, Deloitte & Touche Communication, December 2013

    Google Scholar 

  • The Global Risks Report: World Economic Forum, January 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to ShiannMing Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Wu, S., Guo, D. (2017). Research into Information Security Strategy Practices for Commercial Banks in Taiwan. In: Xhafa, F., Patnaik, S., Yu, Z. (eds) Recent Developments in Intelligent Systems and Interactive Applications. IISA 2016. Advances in Intelligent Systems and Computing, vol 541. Springer, Cham. https://doi.org/10.1007/978-3-319-49568-2_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49568-2_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49567-5

  • Online ISBN: 978-3-319-49568-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics