메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 2501-2506

Examining the linkage between organizational commitment and information security

Author keywords

Information security; Job attitudes; Management; Organizational behavior

Indexed keywords

BEHAVIORAL RESEARCH; DATA PRIVACY; HUMAN COMPUTER INTERACTION; INTERFACES (COMPUTER); MANAGEMENT SCIENCE; NUMERICAL METHODS; SOCIAL ASPECTS; SOCIETIES AND INSTITUTIONS;

EID: 0242637628     PISSN: 08843627     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (43)

References (20)
  • 1
    • 84986665106 scopus 로고
    • The measurement and antecedents of affective, continuance and normative commitment to organizations
    • Allen, N.J., & Meyer, J.P. (1990). The measurement and antecedents of affective, continuance and normative commitment to organizations. Journal of Occupational Psychology, 63, 1-18.
    • (1990) Journal of Occupational Psychology , vol.63 , pp. 1-18
    • Allen, N.J.1    Meyer, J.P.2
  • 4
    • 0242453510 scopus 로고    scopus 로고
    • Information security management: Global challenges in the new millennium
    • Dhillon, G. (Ed.); Hershey, PA: Idea Group Publishing
    • Dhillon, G. (Ed.) (2001). Information security management: Global challenges in the new millennium. Hershey, PA: Idea Group Publishing.
    • (2001)
  • 5
    • 33744996371 scopus 로고    scopus 로고
    • Global information security survey
    • Published in the UK by Presentation Services
    • Ernst and Young L.L.P. (2002). Global Information Security Survey. Published in the UK by Presentation Services.
    • (2002)
    • Ernst1    Young, L.L.P.2
  • 6
    • 0030194196 scopus 로고    scopus 로고
    • Evaluating ethical decision-making and computer use
    • Loch, K. D., & Congers, S. (1996). Evaluating ethical decision-making and computer use. Communications of the ACM, 39(7),74-83.
    • (1996) Communications of the ACM , vol.39 , Issue.7 , pp. 74-83
    • Loch, K.D.1    Congers, S.2
  • 7
    • 0033896875 scopus 로고    scopus 로고
    • Incidence and correlates of pathological internet use among college students
    • Morahan-Martin, J., & Schumacher, P. (2000), Incidence and correlates of pathological Internet use among college students. Computers in Human Behavior, 16 (1), 13-29.
    • (2000) Computers in Human Behavior , vol.16 , Issue.1 , pp. 13-29
    • Morahan-Martin, J.1    Schumacher, P.2
  • 8
    • 0242706108 scopus 로고    scopus 로고
    • OECD guidelines for the security of information systems and networks: Towards a culture of security
    • OECD; Organisation For Economic Co-Operation And Development
    • OECD (2002). OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. Organisation For Economic Co-Operation And Development. Available at: http://www.oecd.org/pdg/M00033000/M00033182.pdf.
    • (2002)
  • 9
    • 0003487308 scopus 로고    scopus 로고
    • Secrets and lies
    • New York: Wiley
    • Schneier, B. (2000). Secrets and Lies. New York: Wiley.
    • (2000)
    • Schneier, B.1
  • 10
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E. E. (2002). A framework for understanding and predicting insider attacks. Computers and Security, 21(6), 526-531.
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 11
    • 0242621902 scopus 로고    scopus 로고
    • March 27 CSI/FBI study says: Security breaches on the rise. Author; Security Wire Digest
    • Security Wire Digest. (2000, March 27) CSI/FBI study says: Security breaches on the rise. Author. Available: http://www.lexias.com/1.0/securitywiredigest_27MAR2000.html
    • (2000)
  • 12
    • 4243840131 scopus 로고    scopus 로고
    • Inside the mind of the insider
    • Shaw, E. D., Post, J. M., & Ruby, K. G. (2002). Inside the Mind of the Insider. Available at http:/www.securitymanagement.com/library/000762.html.
    • (2002)
    • Shaw, E.D.1    Post, J.M.2    Ruby, K.G.3
  • 13
    • 85001555189 scopus 로고    scopus 로고
    • On the role of human morality in information systems security
    • Siponen, M. T. (2001). On the role of human morality in information systems security. Information Resources Management Journal, 14(4), 15-23.
    • (2001) Information Resources Management Journal , vol.14 , Issue.4 , pp. 15-23
    • Siponen, M.T.1
  • 14
    • 0034926180 scopus 로고    scopus 로고
    • A framework for the implementation of socio-ethical controls in information security
    • Trompeter, C. M., & Eloff, J. H. P. (2001). A Framework for the Implementation of Socio-ethical Controls in Information Security. Computers & Security, 20,384-391.
    • (2001) Computers & Security , vol.20 , pp. 384-391
    • Trompeter, C.M.1    Eloff, J.H.P.2
  • 16
    • 0242537133 scopus 로고    scopus 로고
    • Company profile of the frequent internet user: Web addict or happy employee?
    • Stanton, J. M. (2002). Company profile of the frequent Internet user: Web addict or happy employee? Communications of the Association for Computing Machinery, 45 (1), 55-59.
    • (2002) Communications of the Association for Computing Machinery , vol.45 , Issue.1 , pp. 55-59
    • Stanton, J.M.1
  • 17
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D.W. (1990). Effective IS security: an empirical study. Information System Research, 1 (2), 255-277.
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 19
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating our users effectively
    • Thomson, M.E. and von Solms, R. (1998). Information security awareness: educating our users effectively. Information Management & Computer Security, 6 (4), 167-173.
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.