메뉴 건너뛰기




Volumn 24, Issue 1, 2004, Pages 43-57

In defense of the realm: Understanding the threats to information security

Author keywords

[No Author keywords available]

Indexed keywords

CODES (STANDARDS); COMPUTER VIRUSES; COMPUTER WORMS; INTERNET; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 1242265154     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2003.12.003     Document Type: Article
Times cited : (146)

References (66)
  • 1
    • 1242286351 scopus 로고    scopus 로고
    • Anonymous. USAToday. WWW Document, accessed 1/10/2004
    • Anonymous (2001). Chinese hackers call truce in China-US Cyberwar. USAToday. WWW Document, accessed 1/10/2004, http://www.usatoday.com/tech/news/2001-05-09-chinese-hackers-truce.htm .
    • (2001) Chinese Hackers Call Truce in China-US Cyberwar
  • 2
    • 1242308732 scopus 로고    scopus 로고
    • ASIS, American Society for Industrial Security, WWW Document, accessed 09/12/2001,
    • ASIS, (2001). Professional Development. American Society for Industrial Security, WWW Document, accessed 09/12/2001, http://www.asisonline.org/education/index/xml .
    • (2001) Professional Development
  • 3
    • 1242308581 scopus 로고
    • Turning the computer into a criminal
    • August, R. S. (1983). Turning the computer into a criminal. Barrister, 13.
    • (1983) Barrister , vol.13
    • August, R.S.1
  • 4
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville R. Information systems security design methods. Implications for information systems development ACM Computing Surveys. 25(4):1993;375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 7
    • 0013323815 scopus 로고
    • Introduction
    • Blumstein A. C., & D. Nagin (Eds.), Report of the Panel of Deterrence and Incapacitation, National Academy of Sciences, Washington, DC2
    • Blumstein, A. (1978). Introduction. In Blumstein, A. C., & D. Nagin (Eds.), Deterrence and Incapacitation: Estimating the Effects of Crime Sanctions on Criminal Rates. Report of the Panel of Deterrence and Incapacitation, National Academy of Sciences, Washington, DC2.
    • (1978) Deterrence and Incapacitation: Estimating the Effects of Crime Sanctions on Criminal Rates
    • Blumstein, A.1
  • 8
    • 0031673674 scopus 로고    scopus 로고
    • Catapults and grappling hooks: The tools and techniques on information warfare
    • Boulanger A. Catapults and grappling hooks. The tools and techniques on information warfare IBM Systems Journal. 37(1):1998;106-114.
    • (1998) IBM Systems Journal , vol.37 , Issue.1 , pp. 106-114
    • Boulanger, A.1
  • 9
    • 55249089317 scopus 로고
    • Key issues in information systems: 1986
    • Brancheau J., Wetherbe J.C. Key issues in information systems. 1986 MIS Quarterly. 11(1):1987;23-45.
    • (1987) MIS Quarterly , vol.11 , Issue.1 , pp. 23-45
    • Brancheau, J.1    Wetherbe, J.C.2
  • 11
    • 0004888748 scopus 로고    scopus 로고
    • An information security education initiative for engineering and computer science
    • Monterey, CA: Naval Postgraduate School
    • Chin, S. -K., Irvine, C., & Frinke, D. (1997). An information security education initiative for engineering and computer science. In Naval postgraduate school technical report npscs-97-003. Monterey, CA: Naval Postgraduate School.
    • (1997) Naval Postgraduate School Technical Report , vol.NPSCS-97-003
    • Chin, S.-K.1    Irvine, C.2    Frinke, D.3
  • 12
    • 1242331231 scopus 로고    scopus 로고
    • Enterprise security - Built on sound policies
    • December
    • Clyde, R. A. (1999). Enterprise security - built on sound policies. Enterprise Systems Journal, December, 69-72.
    • (1999) Enterprise Systems Journal , pp. 69-72
    • Clyde, R.A.1
  • 14
    • 0000543643 scopus 로고
    • Estimating trait, method, and error variance: Generalizing across 70 construct validation studies
    • Cote J., Buckley M.R. Estimating trait, method, and error variance. Generalizing across 70 construct validation studies Journal of Marketing Research. 24:1987;315-318.
    • (1987) Journal of Marketing Research , vol.24 , pp. 315-318
    • Cote, J.1    Buckley, M.R.2
  • 15
    • 1242263740 scopus 로고    scopus 로고
    • A CPA's guide to the top issues in technology
    • Cryton S.H., Tie R. A CPA's guide to the top issues in technology. Journal of Accountancy. 191(5):2001;71-77.
    • (2001) Journal of Accountancy , vol.191 , Issue.5 , pp. 71-77
    • Cryton, S.H.1    Tie, R.2
  • 17
    • 84986142544 scopus 로고    scopus 로고
    • Security survey: Is it safe?
    • Davis, B. (1997). Security survey: Is it safe?, Information Week.
    • (1997) Information Week
    • Davis, B.1
  • 18
    • 1242263747 scopus 로고
    • Pamphlet. Ernst & Young, 1400 Pillsbury Center, Minneapolis, MS 55402
    • Ernst, & Whinney (1990). Ernst & Whinney 1989 computer security survey report. Pamphlet. Ernst & Young, 1400 Pillsbury Center, Minneapolis, MS 55402.
    • (1990) Ernst & Whinney 1989 Computer Security Survey Report
  • 22
    • 1242308738 scopus 로고
    • Computer crime and abuse by is employees: Something to worry about?
    • Harrington S.J. Computer crime and abuse by is employees. Something to worry about? Journal of Systems Management. 46(2):1995;6-11.
    • (1995) Journal of Systems Management , vol.46 , Issue.2 , pp. 6-11
    • Harrington, S.J.1
  • 23
    • 0000917858 scopus 로고    scopus 로고
    • The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington S.J. The effects of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly. 20(3):1996;257-278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 24
    • 0011418384 scopus 로고
    • Integrating data security into the systems development life cycle
    • Hayam A., Oz E. Integrating data security into the systems development life cycle. Journal of Systems Management. 44(8):1993;16-20.
    • (1993) Journal of Systems Management , vol.44 , Issue.8 , pp. 16-20
    • Hayam, A.1    Oz, E.2
  • 25
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Hoffer J.A., Straub D.W. Jr. The 9 to 5 underground. Are you policing computer crimes? Sloan Management Review. 30(4):1989;35-42.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-42
    • Hoffer, J.A.1    Straub, D.W.Jr.2
  • 27
    • 1242286365 scopus 로고    scopus 로고
    • Security policies: How much is enough?
    • Hulme, G. V. (2001). Security policies: How much is enough? Information Week.
    • (2001) Information Week
    • Hulme, G.V.1
  • 28
    • 0001080103 scopus 로고    scopus 로고
    • Personal computing acceptance factors in small firms: A structural equation model
    • Igbaria M., Zinatelli N., Cragg P., Cavaye A. Personal computing acceptance factors in small firms. A structural equation model MIS Quarterly. 21(2):1997;279-305.
    • (1997) MIS Quarterly , vol.21 , Issue.2 , pp. 279-305
    • Igbaria, M.1    Zinatelli, N.2    Cragg, P.3    Cavaye, A.4
  • 30
    • 3242849223 scopus 로고    scopus 로고
    • Integrating Security into the Curriculum
    • December, 25-30
    • Irvine, C. E., Chin, S. -K., & Frincke, D. (1998). Integrating Security into the Curriculum. IEEE Computer, December, 25-30.
    • (1998) IEEE Computer
    • Irvine, C.E.1    Chin, S.-K.2    Frincke, D.3
  • 33
    • 1242331235 scopus 로고
    • Computer crime: How deep does it go
    • Leinfuss, E. (1986). Computer crime: How deep does it go. MIS Week, 41(7).
    • (1986) MIS Week , vol.41 , Issue.7
    • Leinfuss, E.1
  • 34
    • 84952126179 scopus 로고
    • Cheating behavior, situational influence, and moral development
    • Leming J.S. Cheating behavior, situational influence, and moral development. Journal of Educational Research. 71:1978;214-217.
    • (1978) Journal of Educational Research , vol.71 , pp. 214-217
    • Leming, J.S.1
  • 35
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch K.D., Carr H.H., Warkentin M.E. Threats to information systems. Today's reality, yesterday's understanding MIS Quarterly. 16(2):1992;173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 36
    • 0018012506 scopus 로고
    • Management policies and procedures needed for effective computer security
    • Fall
    • Madnick, S. (1978). Management policies and procedures needed for effective computer security. Sloan Management Review, Fall, 61-74.
    • (1978) Sloan Management Review , pp. 61-74
    • Madnick, S.1
  • 38
    • 1242331237 scopus 로고    scopus 로고
    • Guarding computer data
    • McFadden P.J. Guarding computer data. Journal of Accountancy. 184(1):1997;77-79.
    • (1997) Journal of Accountancy , vol.184 , Issue.1 , pp. 77-79
    • Mcfadden, P.J.1
  • 39
    • 24044502721 scopus 로고
    • Information systems management issues for the 1990s
    • Niederman F., Brancheau J.C., Wetherbe J.C. Information systems management issues for the 1990s. MIS Quarterly. 15(4):1991;475-495.
    • (1991) MIS Quarterly , vol.15 , Issue.4 , pp. 475-495
    • Niederman, F.1    Brancheau, J.C.2    Wetherbe, J.C.3
  • 43
    • 0039502924 scopus 로고
    • The ethical decision-making processes of information systems workers
    • Paradice D.B., Dejoie R.M. The ethical decision-making processes of information systems workers. Journal of Business Ethics. 10(1):1991;1-22.
    • (1991) Journal of Business Ethics , vol.10 , Issue.1 , pp. 1-22
    • Paradice, D.B.1    Dejoie, R.M.2
  • 45
    • 84970235764 scopus 로고
    • Self-reports in organizational research: Problems and prospects
    • Podsakoff P.M., Organ D.W. Self-reports in organizational research. Problems and prospects Journal of Management. 12(4):1986;531-544.
    • (1986) Journal of Management , vol.12 , Issue.4 , pp. 531-544
    • Podsakoff, P.M.1    Organ, D.W.2
  • 48
    • 0006528240 scopus 로고    scopus 로고
    • Profiles of strategic information systems planning
    • Segars A.H., Grover V. Profiles of strategic information systems planning. Information Systems Research. 10(3):1999;199-232.
    • (1999) Information Systems Research , vol.10 , Issue.3 , pp. 199-232
    • Segars, A.H.1    Grover, V.2
  • 50
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • Straub D.W. Jr. Effective is security. An empirical study Information Systems Research. 1(3):1990;255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.Jr.1
  • 51
    • 0141463342 scopus 로고
    • Deterring cheating by student programmers: A field experiment in computer security
    • Straub D.W. Jr., Carlson P.J., Jones E.H. Deterring cheating by student programmers. A field experiment in computer security Journal of Management Systems. 5(1):1993;33-48.
    • (1993) Journal of Management Systems , vol.5 , Issue.1 , pp. 33-48
    • Straub, D.W.Jr.1    Carlson, P.J.2    Jones, E.H.3
  • 52
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations
    • Straub D.W. Jr., Nance W.D. Discovering and disciplining computer abuse in organizations. MIS Quarterly. 14(1):1990;45-60.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.Jr.1    Nance, W.D.2
  • 53
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub D.W. Jr., Welke R.J. Coping with systems risk. Security planning models for management decision making MIS Quarterly. 22(4):1998;441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.Jr.1    Welke, R.J.2
  • 54
    • 1242331240 scopus 로고
    • Deviancy by bits and bytes: Computer abusers and control measures
    • J.H.F.a.E.G. Dougall. Amsterdam: Science Publishers BV North Holland
    • Straub D.W. Jr., Widom C.S. Deviancy by bits and bytes. Computer abusers and control measures Dougall J.H.F.a.E.G. Computer security: A global challenge. 1984;91-102 Science Publishers BV North Holland, Amsterdam.
    • (1984) Computer Security: A Global Challenge , pp. 91-102
    • Straub, D.W.Jr.1    Widom, C.S.2
  • 55
    • 81755175730 scopus 로고    scopus 로고
    • Sword & Shield Security Consultants, WWW Document, accessed 09/15/2001
    • Sword & Shield. (2001). Top 10 list of proactive security measures. Sword & Shield Security Consultants, WWW Document, accessed 09/15/2001, http://www.sses.net/top10.html .
    • (2001) Top 10 List of Proactive Security Measures
  • 57
    • 0033319075 scopus 로고    scopus 로고
    • Integration of computer security into software engineering and computer science programs
    • Vaughn R.B., Bogess J.E. III Integration of computer security into software engineering and computer science programs. The Journal of Systems and Software. 49(2,3):1999;149-153.
    • (1999) The Journal of Systems and Software , vol.49 , Issue.2-3 , pp. 149-153
    • Vaughn, R.B.1    Bogess III, J.E.2
  • 62
    • 1242331227 scopus 로고    scopus 로고
    • An examination of cross-national differences in computer-related ethical decision making
    • Whitman M.E., Townsend A.M., Hendrickson A.R., Fields D.A. An examination of cross-national differences in computer-related ethical decision making. ACMSIG Computers and Society. 28(4):1998;22-27.
    • (1998) ACMSIG Computers and Society , vol.28 , Issue.4 , pp. 22-27
    • Whitman, M.E.1    Townsend, A.M.2    Hendrickson, A.R.3    Fields, D.A.4
  • 64
    • 0022178828 scopus 로고
    • Computer crime-risk management and computer security
    • Wong, K. (1985). Computer crime-risk management and computer security. Computers and Security, 4, 287-295.
    • (1985) Computers and Security , vol.4 , pp. 287-295
    • Wong, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.