Abstract
With the explosion of the internet, computers and networks have become an indispensable part of life, and due to the rise of E-commerce, enterprises can increase productivity and competitiveness via internet. All things related to the internet have produced new and inspiring opportunities in data access, commercial operations, and productivity. The recent big data, cloud computing, mobile commerce, internet, Blockchain, FinTech, and other network applications, as well as P2P transactions, all force electronic transaction patterns to undergo drastic change. The formulation of an information security strategy is of great importance to an organization’s success and continued existence.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Research, Development and Evaluation Commission: Executive Yuan, Risk Management Operation Manual Ver 3.0
http://www.rdec.gov.tw/DO/DownloadControllerNDO.asp, 31 December 2013
Global Technology Audit Guideline (GTAG): The Institute of Internal Auditors-Chinese Taiwan, June 2011
Li, P.C.: Discussion on IT Control Framework COBIT. Taiwan Stock Exchange Corporation, September 2009
Hong, K.S., Chao, R.Y.: Discussion on the theory of information security management. Comments Inf. Manage. 12(6), 17–47 (2003)
Liu, Y.L.: Formation mechanism and comprehensive evaluation of synergistic effect for virtual enterprises knowledge. Commer. Econ. 9, 99–101 (2009)
Hang, G.M.: Analysis on high-level development strategy for bank information security. Agri. Dev. Financ., 1 (2006)
Huang, K.P.: Discussion on requirement and application of ISO31000 risk management, Bimonthly on Development of Sustainable Industry, no. 53, December 2010
Yu, S.W.: Risk management idea and framework for advanced Countries. National Central University (2007)
Chen, C.M., Yeh, K.C.: The Late International Standards on Information Security Management–Brief Discussion on the Emphasis of New Version of ISO 27001, Deloitte & Touche Communication, December 2013
The Global Risks Report: World Economic Forum, January 2015
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wu, S., Guo, D. (2017). Research into Information Security Strategy Practices for Commercial Banks in Taiwan. In: Xhafa, F., Patnaik, S., Yu, Z. (eds) Recent Developments in Intelligent Systems and Interactive Applications. IISA 2016. Advances in Intelligent Systems and Computing, vol 541. Springer, Cham. https://doi.org/10.1007/978-3-319-49568-2_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-49568-2_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49567-5
Online ISBN: 978-3-319-49568-2
eBook Packages: EngineeringEngineering (R0)