메뉴 건너뛰기




Volumn 8, Issue 1, 2000, Pages 31-41

Conceptual foundation for organizational information security awareness

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION DISSEMINATION; INFORMATION RETRIEVAL SYSTEMS;

EID: 0033683516     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220010371394     Document Type: Article
Times cited : (485)

References (57)
  • 1
    • 33746633350 scopus 로고
    • Perceived usefulness, easy of use, and usage of information technology: A replication
    • Adams , D.A., Nelson, R.R. and Todd, P.A. (1992), "Perceived usefulness, easy of use, and usage of information technology: a replication", MIS Quarterly, Vol. 16 No. 2, pp. 227-47.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 227-247
    • Adams, D.A.1    Nelson, R.R.2    Todd, P.A.3
  • 4
    • 6744247045 scopus 로고
    • Logical controls specification: An approach to information system security
    • Klein, H. and Kumar, K. (Eds), North-Holland, Amsterdam
    • Baskerville, R. (1989), "Logical controls specification: an approach to information system security", in Klein, H. and Kumar, K. (Eds), Systems Development for Human Progress, North-Holland, Amsterdam.
    • (1989) Systems Development for Human Progress
    • Baskerville, R.1
  • 5
    • 0002608856 scopus 로고
    • In search of the moral manager
    • Carrol , A.B. (1987), "In search of the moral manager", Business Horizons, March-April, p. 8.
    • (1987) Business Horizons , vol.MARCH-APRIL , pp. 8
    • Carrol, A.B.1
  • 6
    • 6744255767 scopus 로고    scopus 로고
    • Penetration testing through social engineering
    • Ceraolo, J.P. (1996), "Penetration testing through social engineering", Information Systems Security, Vol. 4 No. 4, Winter.
    • (1996) Information Systems Security , vol.4 , Issue.4 WINTER
    • Ceraolo, J.P.1
  • 8
    • 0030307369 scopus 로고    scopus 로고
    • An empirical assessment of a modified technology acceptance model
    • Chau, P (1996), "An empirical assessment of a modified technology acceptance model", Journal of Management Information Systems, Vol. 13 No. 2, pp. 185-205.
    • (1996) Journal of Management Information Systems , vol.13 , Issue.2 , pp. 185-205
    • Chau, P.1
  • 10
    • 6744251943 scopus 로고
    • Why there is really no such things as the theory of motivation
    • Dancy, J. (1994), "Why there is really no such things as the theory of motivation", Proceedings of the Aristotelian Society.
    • (1994) Proceedings of the Aristotelian Society
    • Dancy, J.1
  • 11
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis , F. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, Vol. 13 No. 3, September, pp. 319-40.
    • (1989) MIS Quarterly , vol.13 , Issue.3 SEPTEMBER , pp. 319-340
    • Davis, F.1
  • 18
    • 6744260747 scopus 로고
    • Oxford University Press, Reprinted in 20th century Ethical theory, in Cahn, S.M. and Haber, J.G. (Eds), R.M Hare: A Moral Argument, 1995, Prentice-Hall, Englewood Cliffs, NJ
    • Hare, R.M. (1963), Freedom and Reason, Oxford University Press, Reprinted in 20th century Ethical theory, in Cahn, S.M. and Haber, J.G. (Eds), R.M Hare: A Moral Argument, 1995, Prentice-Hall, Englewood Cliffs, NJ.
    • (1963) Freedom and Reason
    • Hare, R.M.1
  • 19
    • 0004093084 scopus 로고    scopus 로고
    • Oxford University Press, Oxford
    • Hare, R.M. (1997), Sorting Out Ethics, Oxford University Press, Oxford.
    • (1997) Sorting out Ethics
    • Hare, R.M.1
  • 21
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Hoffer, J.A. and Straub, D.W. (1989), "The 9 to 5 underground: are you policing computer crimes?", Sloan Management Review, Vol. 30 No. 4, Summer.
    • (1989) Sloan Management Review , vol.30 , Issue.4 SUMMER
    • Hoffer, J.A.1    Straub, D.W.2
  • 22
    • 0001080103 scopus 로고    scopus 로고
    • Personal computing acceptance factors in small firms: A structural equation model
    • Igbaria, M. and Zinatelli, N. (1997), "Personal computing acceptance factors in small firms: a structural equation model", MIS Quarterly, Vol. 21 No. 3.
    • (1997) MIS Quarterly , vol.21 , Issue.3
    • Igbaria, M.1    Zinatelli, N.2
  • 23
    • 0011648740 scopus 로고    scopus 로고
    • The new classification of research approaches
    • Edited by Zemanek, H., IFIP, Laxenburg
    • Järvinen, P. (1997), "The new classification of research approaches", The IFIP Pink Summary - 35 Years of IFIP, Edited by Zemanek, H., IFIP, Laxenburg.
    • (1997) The IFIP Pink Summary - 35 Years of IFIP
    • Järvinen, P.1
  • 26
    • 0002175441 scopus 로고    scopus 로고
    • The truth, the quality, and the interpretation
    • Julkunen, K. (Ed.), University of Joensuu, Bulletins of the Faculty of Education, Joensuu, Finland
    • Koski, L. (1996), "The truth, the quality, and the interpretation", in Julkunen, K. (Ed.), Qualitative Methodology in Educational Research, University of Joensuu, Bulletins of the Faculty of Education, No. 60, Joensuu, Finland.
    • (1996) Qualitative Methodology in Educational Research , Issue.60
    • Koski, L.1
  • 27
    • 84938015068 scopus 로고
    • Collective and individual moral responsibility in engineering: Some questions
    • Ladd, J. (1982), "Collective and individual moral responsibility in engineering: some questions", IEEE Technology and Society, Vol. 1 No. 2, pp. 3-10.
    • (1982) IEEE Technology and Society , vol.1 , Issue.2 , pp. 3-10
    • Ladd, J.1
  • 28
    • 43549112930 scopus 로고
    • The motivation sequence, the motivation hub, and the motivation core
    • Locke, E.A. (1991), "The motivation sequence, the motivation hub, and the motivation core", Organizational Behavior and Human Decision Processes, Vol. 50, pp. 288-99.
    • (1991) Organizational Behavior and Human Decision Processes , vol.50 , pp. 288-299
    • Locke, E.A.1
  • 30
    • 73549114871 scopus 로고
    • Predicting user intentions: Comparing the technology acceptance model with the theory of planned behaviour
    • Mathieson, K. (1991), "Predicting user intentions: comparing the technology acceptance model with the theory of planned behaviour", Information System Research, Vol. 3 No. 2, pp. 173-91.
    • (1991) Information System Research , vol.3 , Issue.2 , pp. 173-191
    • Mathieson, K.1
  • 31
    • 6744260746 scopus 로고
    • Information security awareness - Selling the cause
    • 27-29 May, Singapore
    • McLean, K. (1992), "Information security awareness - selling the cause", Proceedings of the IFIP TC11/Sec'92, 27-29 May, Singapore.
    • (1992) Proceedings of the IFIP TC11/Sec'92
    • McLean, K.1
  • 32
    • 84992944805 scopus 로고    scopus 로고
    • Business continuity: Awareness and training programmes
    • Morwood, G. (1998), "Business continuity: awareness and training programmes", Information Management & Computer Security, Vol. 6 No. 1, pp. 28-32.
    • (1998) Information Management & Computer Security , vol.6 , Issue.1 , pp. 28-32
    • Morwood, G.1
  • 33
    • 0038562418 scopus 로고
    • An Introduction to Computer Security
    • NIST special publications in October
    • (The) NIST Handbook (1995), An Introduction to Computer Security, NIST special publications in October.
    • (1995) (The) NIST Handbook
  • 36
    • 6744221155 scopus 로고
    • Aavaranta Serie. (in Finnish) Otava, Keuruu, Finland
    • Peltonen, M. (1989), Management in the 1990s, Aavaranta Serie. No. 14, (in Finnish) Otava, Keuruu, Finland.
    • (1989) Management in the 1990s , Issue.14
    • Peltonen, M.1
  • 39
  • 41
    • 0031644921 scopus 로고    scopus 로고
    • Ontology of organizational IT security awareness from theoretical foundations to practical framework
    • Third International Workshop on Enterprise Security, IEEE Computer Society Press, Los Alamitos, CA
    • Siponen, M.T. and Kajava, J. (1998), "Ontology of organizational IT security awareness From theoretical foundations to practical framework", Third International Workshop on Enterprise Security, IEEE 7th International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WET ICE '98), IEEE Computer Society Press, Los Alamitos, CA.
    • (1998) IEEE 7th International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WET ICE '98)
    • Siponen, M.T.1    Kajava, J.2
  • 43
    • 6744265224 scopus 로고    scopus 로고
    • Competing against human failing. 15th IFIP World Computer Congress, 'The Global Information Society on the way to the next millennium'
    • TC11, Vienna
    • Spruit, M.E.M. (1998), "Competing against human failing. 15th IFIP World Computer Congress, 'The Global Information Society on the way to the next millennium"', Proceedings of the SEC'98, TC11, Vienna.
    • (1998) Proceedings of the SEC'98
    • Spruit, M.E.M.1
  • 44
    • 0242453511 scopus 로고
    • Promoting security awareness and commitment
    • Spurling, P. (1995), "Promoting security awareness and commitment", Information Management and Computer Security, Vol. 3 No. 2, pp. 20-6.
    • (1995) Information Management and Computer Security , vol.3 , Issue.2 , pp. 20-26
    • Spurling, P.1
  • 45
    • 0011524195 scopus 로고    scopus 로고
    • SSE-CMM (1998a), The Model, v2.0, http:// www.sse-cmm.org.
    • (1998) The Model, V2.0
  • 48
    • 0000280419 scopus 로고
    • Effective IS security; an empirical study
    • Straub, D.W. (1990), "Effective IS security; an empirical study", Information System Research, Vol. 1 No. 2, June, pp. 255-77.
    • (1990) Information System Research , vol.1 , Issue.2 JUNE , pp. 255-277
    • Straub, D.W.1
  • 50
    • 0002630371 scopus 로고    scopus 로고
    • Testing the technology acceptance model across cultures: A three country study
    • Straub, D.W., Keil, M. and Brenner, W. (1997), "Testing the technology acceptance model across cultures: a three country study", Information & Management, Vol. 31 No. 1, November, pp. 1-11.
    • (1997) Information & Management , vol.31 , Issue.1 NOVEMBER , pp. 1-11
    • Straub, D.W.1    Keil, M.2    Brenner, W.3
  • 51
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W. and Welke, R.J. (1998), "Coping with systems risk: security planning models for management decision making", MIS Quarterly, Vol. 22 No. 4, p. 441-64.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 53
    • 0004358917 scopus 로고
    • Senior executives and ISO 9000: Attitudes, behaviours and commitment
    • Taylor, W.A. (1995), "Senior executives and ISO 9000: attitudes, behaviours and commitment", International Journal of Quality & Reliability Management, Vol. 22 No. 4, pp 40-57.
    • (1995) International Journal of Quality & Reliability Management , vol.22 , Issue.4 , pp. 40-57
    • Taylor, W.A.1
  • 56
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating our users effectively
    • Thomson, M.E. and von Solms, R. (1998), "Information security awareness: educating our users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73.
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 57
    • 0039639238 scopus 로고
    • Organizational computer security policy: The reality
    • Warman, A.R. (1992), "Organizational computer security policy: the reality", European Journal of Information Systems, Vol. 1 No. 5, pp. 305-10.
    • (1992) European Journal of Information Systems , vol.1 , Issue.5 , pp. 305-310
    • Warman, A.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.