메뉴 건너뛰기




Volumn 23, Issue 2, 2003, Pages 139-154

An integrative study of information systems security effectiveness

Author keywords

Information systems; Organizations; Security; Strategic advantage

Indexed keywords

FINANCE; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS; STRATEGIC PLANNING;

EID: 0037400028     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0268-4012(02)00105-6     Document Type: Article
Times cited : (396)

References (55)
  • 1
    • 0013323636 scopus 로고    scopus 로고
    • Lotsa talk, little walk
    • Anthes G.H. Lotsa talk, little walk. Computerworld. 32(38):1998;70-71.
    • (1998) Computerworld , vol.32 , Issue.38 , pp. 70-71
    • Anthes, G.H.1
  • 2
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibility and security of information systems
    • Backhouse J., Dhillon G. Structures of responsibility and security of information systems. European Journal of Information Systems. 5(1):1996;2-9.
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-9
    • Backhouse, J.1    Dhillon, G.2
  • 4
    • 0013323252 scopus 로고    scopus 로고
    • Modern network complexity needs comprehensive security
    • Barsanti C. Modern network complexity needs comprehensive security. Security. 36(7):1999;65-68.
    • (1999) Security , vol.36 , Issue.7 , pp. 65-68
    • Barsanti, C.1
  • 5
    • 0013324190 scopus 로고
    • Risk analysis: An interpretive feasibility tool in justifying information systems security
    • Baskerville R. Risk analysis. An interpretive feasibility tool in justifying information systems security European Journal of Information Systems. 1:1991;121-130.
    • (1991) European Journal of Information Systems , vol.1 , pp. 121-130
    • Baskerville, R.1
  • 7
    • 9744281201 scopus 로고    scopus 로고
    • Key issues in information systems management: 1994-95 SIM Delphi results
    • Brancheau J.C., Janz B.D., Wetherbe J.C. Key issues in information systems management. 1994-95 SIM Delphi results MIS Quarterly. 20(2):1996;225-242.
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 225-242
    • Brancheau, J.C.1    Janz, B.D.2    Wetherbe, J.C.3
  • 8
    • 0013417916 scopus 로고
    • The new age of anxiety
    • Burger K. The new age of anxiety. Insurance and Technology. 18(10):1993;48-54.
    • (1993) Insurance and Technology , vol.18 , Issue.10 , pp. 48-54
    • Burger, K.1
  • 10
    • 0042500199 scopus 로고
    • Calgary, AB: University of Calgary
    • Chin W. PLS-Graph: Version 2.7. 1994;University of Calgary, Calgary, AB.
    • (1994) PLS-Graph: Version 2.7
    • Chin, W.1
  • 13
    • 0000935861 scopus 로고
    • Research in criminal deterrence: Laying the groundwork for the second decade
    • N. Morris & M. Tonry (Eds.). Chicago, IL: University of Chicago Press
    • Cook, P. J. (1982). Research in criminal deterrence: Laying the groundwork for the second decade. In N. Morris & M. Tonry (Eds.), Crime and justice: An annual review of research (pp. 211-268). Chicago, IL: University of Chicago Press.
    • (1982) Crime and Justice: An Annual Review of Research , pp. 211-268
    • Cook, P.J.1
  • 15
    • 0000277455 scopus 로고
    • Organizational innovation: A meta-analysis of effects of determinants and moderators
    • Damanpour F. Organizational innovation. A meta-analysis of effects of determinants and moderators Academy of Management Journal. 34(3):1991;555-590.
    • (1991) Academy of Management Journal , vol.34 , Issue.3 , pp. 555-590
    • Damanpour, F.1
  • 16
    • 0002681615 scopus 로고
    • Determinants of success for computer usage in small business
    • Delone W.H. Determinants of success for computer usage in small business. MIS Quarterly. 12(1):1988;51-61.
    • (1988) MIS Quarterly , vol.12 , Issue.1 , pp. 51-61
    • Delone, W.H.1
  • 17
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon G., Backhouse J. Information system security management in the new millennium. Communications of the ACM. 43(7):2000;125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 18
    • 0001049818 scopus 로고
    • Organizational context and the success of management information systems
    • Ein-Dor P., Segev E. Organizational context and the success of management information systems. Management Science. 24(10):1978;1064-1077.
    • (1978) Management Science , vol.24 , Issue.10 , pp. 1064-1077
    • Ein-Dor, P.1    Segev, E.2
  • 19
    • 0024129483 scopus 로고
    • Computer security policy: Important issues
    • Eloff J.H.P. Computer security policy. Important issues Computers and Security. 7(6):1988;559-562.
    • (1988) Computers and Security , vol.7 , Issue.6 , pp. 559-562
    • Eloff, J.H.P.1
  • 23
    • 0001823869 scopus 로고
    • Security concerns of system users: A study of perceptions of the adequacy of security
    • Goodhue D.L., Straub D.W. Security concerns of system users. A study of perceptions of the adequacy of security Information and Management. 20(1):1991;13-27.
    • (1991) Information and Management , vol.20 , Issue.1 , pp. 13-27
    • Goodhue, D.L.1    Straub, D.W.2
  • 26
    • 0013422604 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • P. Gray, W. R. King, E. R. Mclean, & H. Watson (Eds.). Fort Worth, TX: Harcourt Brace
    • Hoffer, J. A., & Straub, D. W. (1994). The 9 to 5 underground: Are you policing computer crimes? In P. Gray, W. R. King, E. R. Mclean, & H. Watson (Eds.), Management of information systems (pp. 388-401). Fort Worth, TX: Harcourt Brace.
    • (1994) Management of Information Systems , pp. 388-401
    • Hoffer, J.A.1    Straub, D.W.2
  • 27
    • 0001366346 scopus 로고
    • Information technology and corporate strategy: A view from the top
    • Jarvenpaa S.L., Ives B. Information technology and corporate strategy. A view from the top Information Systems Research. 1(4):1990;351-375.
    • (1990) Information Systems Research , vol.1 , Issue.4 , pp. 351-375
    • Jarvenpaa, S.L.1    Ives, B.2
  • 28
    • 0002904380 scopus 로고
    • Organizational characteristics and information systems planning: An empirical study
    • King W.R. Organizational characteristics and information systems planning. An empirical study Information Systems Research. 5(2):1994;75-109.
    • (1994) Information Systems Research , vol.5 , Issue.2 , pp. 75-109
    • King, W.R.1
  • 29
    • 85021329238 scopus 로고
    • Some minimum requirements for legal sanctioning systems special emphasis on detection
    • A. Blumstein, J. Cohen, & D. Nagin. Washington, DC: National Academy of Sciences
    • Klete H. Some minimum requirements for legal sanctioning systems special emphasis on detection. Blumstein A., Cohen J., Nagin D. Deterrence and incapacitation: Estimating the effects of criminal sanctions on crime rates. 1978;National Academy of Sciences, Washington, DC.
    • (1978) Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
    • Klete, H.1
  • 30
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch K.D., Carr H.H., Warkentin M.E. Threats to information systems. Today's reality, yesterday's understanding MIS Quarterly. 17(2):1992;173-186.
    • (1992) MIS Quarterly , vol.17 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 31
    • 0018012506 scopus 로고
    • Management policies and procedures needed for effective computer security
    • Madnick S. Management policies and procedures needed for effective computer security. Sloan Management Review. 20(1):1978;61-74.
    • (1978) Sloan Management Review , vol.20 , Issue.1 , pp. 61-74
    • Madnick, S.1
  • 34
    • 0028713556 scopus 로고
    • Development of security policies
    • Olnes J. Development of security policies. Computers and Security. 13(8):1994;628-636.
    • (1994) Computers and Security , vol.13 , Issue.8 , pp. 628-636
    • Olnes, J.1
  • 35
    • 0011410153 scopus 로고
    • Informationweek/Ernst and Young security survey
    • Panettieri J.C. Informationweek/Ernst and Young security survey. Informationweek. 555:1995;32-37.
    • (1995) Informationweek , vol.555 , pp. 32-37
    • Panettieri, J.C.1
  • 38
  • 39
    • 70449781351 scopus 로고
    • Organizational context and information systems success: A contingency approach
    • Raymond L. Organizational context and information systems success. A contingency approach Journal of Management Information Systems. 6(4):1990;5-20.
    • (1990) Journal of Management Information Systems , vol.6 , Issue.4 , pp. 5-20
    • Raymond, L.1
  • 40
    • 0003186053 scopus 로고
    • An empirical investigation of factors influencing the success of customer oriented strategic systems
    • Reich B.H., Benbasat I. An empirical investigation of factors influencing the success of customer oriented strategic systems. Information Systems Research. 1(3):1990;325-347.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 325-347
    • Reich, B.H.1    Benbasat, I.2
  • 41
    • 84925902298 scopus 로고
    • Toward a theory of criminal deterrence
    • Silberman M. Toward a theory of criminal deterrence. American Sociological Review. 41:1976;442-461.
    • (1976) American Sociological Review , vol.41 , pp. 442-461
    • Silberman, M.1
  • 43
    • 0013417738 scopus 로고
    • Computer abuse and computer security: Update on an empirical study
    • Straub D.W. Computer abuse and computer security. Update on an empirical study Security, Audit, and Control Review. 4(2):1986;21-31.
    • (1986) Security, Audit, and Control Review , vol.4 , Issue.2 , pp. 21-31
    • Straub, D.W.1
  • 44
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub D.W. Effective IS security. An empirical study Information Systems Research. 1(3):1990;255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 45
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Straub D.W., Nance W.D. Discovering and disciplining computer abuse in organizations. A field study MIS Quarterly. 14(1):1990;45-60.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 46
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub D.W., Welke R.J. Coping with systems risk. Security planning models for management decision making MIS Quarterly. 22(4):1998;441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 47
    • 0030488640 scopus 로고    scopus 로고
    • Top management support, external expertise and information systems implementation in small businesses
    • Thong J.Y.L., Yap C.S., Raman K.S. Top management support, external expertise and information systems implementation in small businesses. Information Systems Research. 7(2):1996;248-267.
    • (1996) Information Systems Research , vol.7 , Issue.2 , pp. 248-267
    • Thong, J.Y.L.1    Yap, C.S.2    Raman, K.S.3
  • 48
    • 0013417739 scopus 로고    scopus 로고
    • Disaster recovery planning still lags
    • Verton D. Disaster recovery planning still lags. Computerworld. 36(14):2002;10.
    • (2002) Computerworld , vol.36 , Issue.14 , pp. 10
    • Verton, D.1
  • 52
    • 84935665607 scopus 로고
    • Perceptual research on general deterrence: A critical review
    • Williams K.R., Hawkins R. Perceptual research on general deterrence. A critical review Law and Society. 20(4):1986;545-572.
    • (1986) Law and Society , vol.20 , Issue.4 , pp. 545-572
    • Williams, K.R.1    Hawkins, R.2
  • 53
    • 0023401519 scopus 로고
    • Information systems security: Management success factors
    • Wood C.C. Information systems security. Management success factors Computers and Security. 4(6):1987;314-320.
    • (1987) Computers and Security , vol.4 , Issue.6 , pp. 314-320
    • Wood, C.C.1
  • 54
    • 0001761622 scopus 로고
    • Information system success factors in small business
    • Yap C.S., Soh C.P.P., Raman K.S. Information system success factors in small business. Omega. 20(5):1992;597-609.
    • (1992) Omega , vol.20 , Issue.5 , pp. 597-609
    • Yap, C.S.1    Soh, C.P.P.2    Raman, K.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.