메뉴 건너뛰기




Volumn 22, Issue 4, 1998, Pages 441-464

Coping with systems risk: Security planning models for management decision making

Author keywords

Action research; Information security planning; Security awareness training; Systems security risk

Indexed keywords

DECISION MAKING; ENGINEERING RESEARCH; FEEDBACK; PERSONNEL TRAINING; RISK ASSESSMENT; STRATEGIC PLANNING; SYSTEMS ANALYSIS;

EID: 0001133137     PISSN: 02767783     EISSN: None     Source Type: Journal    
DOI: 10.2307/249551     Document Type: Article
Times cited : (867)

References (19)
  • 2
    • 0025031229 scopus 로고
    • Computer security: Planning to protect corporate assets
    • January-February
    • Schwartz, M. "Computer Security: Planning to Protect Corporate Assets," Journal of Business Strategy (11:1), January-February 1990, pp. 38-41.
    • (1990) Journal of Business Strategy , vol.11 , Issue.1 , pp. 38-41
    • Schwartz, M.1
  • 8
    • 0013417738 scopus 로고
    • Computer abuse and computer security: Update on an empirical study
    • Spring
    • Straub, D. W. "Computer Abuse and Computer Security: Update on an Empirical Study," Security, Audit, and Control Review (4:2), Spring 1986a, pp. 21-31.
    • (1986) Security, Audit, and Control Review , vol.4 , Issue.2 , pp. 21-31
    • Straub, D.W.1
  • 10
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. W. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), 1990, pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 11
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • March
    • Straub, D. W., and Nance, W. D. "Discovering and Disciplining Computer Abuse in Organizations: A Field Study," MIS Quarterly (14:1), March 1990, pp. 45-62.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-62
    • Straub, D.W.1    Nance, W.D.2
  • 12
    • 0021551244 scopus 로고
    • Deviancy by bits and bytes: Computer abusers and control measures
    • J. H. Finch and E. G. Dougall (eds.), Elsevier Science Publishers B.V. (North Holland), Amsterdam
    • Straub, D. W., and Widom, C. S. "Deviancy by Bits and Bytes: Computer Abusers and Control Measures," in Computer Security: A Global Challenge, J. H. Finch and E. G. Dougall (eds.), Elsevier Science Publishers B.V. (North Holland), Amsterdam, 1984, pp. 431-442.
    • (1984) Computer Security: A Global Challenge , pp. 431-442
    • Straub, D.W.1    Widom, C.S.2
  • 13
    • 8744241162 scopus 로고
    • Deterring highly motivated computer abusers: A field experiment in computer security
    • G. G. Gable and W. J. Caelli (eds.), North-Holland, Amsterdam
    • Straub, D. W., Carlson, P. J., and Jones, E. H. "Deterring Highly Motivated Computer Abusers: A Field Experiment in Computer Security," in IT Security: The Need for International Cooperation, G. G. Gable and W. J. Caelli (eds.), North-Holland, Amsterdam, 1992, pp. 309-324.
    • (1992) IT Security: the Need for International Cooperation , pp. 309-324
    • Straub, D.W.1    Carlson, P.J.2    Jones, E.H.3
  • 14
    • 0141463342 scopus 로고
    • Deterring cheating by student programmers: A field experiment in computer security
    • Straub, D. W., Carlson, P. J., and Jones, E. H. "Deterring Cheating by Student Programmers: A Field Experiment in Computer Security," Journal of Management Systems (5:1), 1993, pp. 33-48.
    • (1993) Journal of Management Systems , vol.5 , Issue.1 , pp. 33-48
    • Straub, D.W.1    Carlson, P.J.2    Jones, E.H.3
  • 15
    • 0039818271 scopus 로고
    • Research on MIS planning: Some guidelines from strategic planning research
    • Winter
    • Venkatraman, N. "Research on MIS Planning: Some Guidelines from Strategic Planning Research," Journal of Management Information Systems (2:3), Winter 1985-86, pp. 65-77.
    • (1985) Journal of Management Information Systems , vol.2 , Issue.3 , pp. 65-77
    • Venkatraman, N.1
  • 18
    • 9744223181 scopus 로고
    • A context for information systems security planning
    • October
    • Wood, C. C. "A Context for Information Systems Security Planning," Computers & Security (7:5), October 1988, pp. 455-465.
    • (1988) Computers & Security , vol.7 , Issue.5 , pp. 455-465
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.