메뉴 건너뛰기




Volumn 56, Issue 3, 2005, Pages 245-257

Sensitive information: A review and research agenda

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION SYSTEMS; INFORMATION SENSITIVITY; INFORMATION SYSTEMS; SECURITY INFORMATICS;

EID: 13844297772     PISSN: 15322882     EISSN: None     Source Type: Journal    
DOI: 10.1002/asi.20121     Document Type: Review
Times cited : (26)

References (89)
  • 1
    • 0039604680 scopus 로고    scopus 로고
    • Information asymmetry, R & D and insider gains
    • Aboody, D., & Lev, B. (2000). Information asymmetry, R & D and insider gains. Journal of Finance, 55(6), 2747-2767.
    • (2000) Journal of Finance , vol.55 , Issue.6 , pp. 2747-2767
    • Aboody, D.1    Lev, B.2
  • 3
    • 0032695088 scopus 로고    scopus 로고
    • Dangerous liaisons: Trust, distrust, and information technology in American work organizations
    • Baba, M.L. (1999). Dangerous liaisons: Trust, distrust, and information technology in American work organizations. Human Organization, 58(3), 331-346.
    • (1999) Human Organization , vol.58 , Issue.3 , pp. 331-346
    • Baba, M.L.1
  • 4
    • 0002260667 scopus 로고
    • Bibliographic classification theory and text linguistics: Aboutncss analysis, intertextuality, and the cognitive act of classifying documents
    • Beghtol, C. (1986). Bibliographic classification theory and text linguistics: Aboutncss analysis, intertextuality, and the cognitive act of classifying documents. Journal of Documentation, 42(2), 84-113.
    • (1986) Journal of Documentation , vol.42 , Issue.2 , pp. 84-113
    • Beghtol, C.1
  • 5
    • 53349144801 scopus 로고
    • 'Facets' as interdisciplinary undiscovered public knowledge: S.R. Ranganathan in India and L. Guttman in Israel
    • Beghtol, C. (1995). 'Facets' as interdisciplinary undiscovered public knowledge: S.R. Ranganathan in India and L. Guttman in Israel. Journal of Documentation, 51(3), 194-224.
    • (1995) Journal of Documentation , vol.51 , Issue.3 , pp. 194-224
    • Beghtol, C.1
  • 6
    • 0012811413 scopus 로고
    • New Brunswick, NJ: Rutgers University Press
    • Bellman, B.L. (1984). The language of secrecy. New Brunswick, NJ: Rutgers University Press.
    • (1984) The Language of Secrecy
    • Bellman, B.L.1
  • 8
    • 0033482257 scopus 로고    scopus 로고
    • Market transparency: Who wins and who loses?
    • Bloomfield, R., & O'Hara, M. (1999). Market transparency: Who wins and who loses? Review of Financial Studies, 12(1), 5-35.
    • (1999) Review of Financial Studies , vol.12 , Issue.1 , pp. 5-35
    • Bloomfield, R.1    O'Hara, M.2
  • 10
    • 0020304239 scopus 로고
    • Beyond topicality: A two-stage view of relevance and the retrieval process
    • Boyce, B. (1982). Beyond topicality: A two-stage view of relevance and the retrieval process. Information Processing and Management, 18, 105-109.
    • (1982) Information Processing and Management , vol.18 , pp. 105-109
    • Boyce, B.1
  • 11
    • 0010024543 scopus 로고
    • On secrecy and the control of knowledge: Taos Pueblo
    • S. Tefft (Ed.), New York: Human Sciences Press
    • Brandt, E. (1980). On secrecy and the control of knowledge: Taos Pueblo. In S. Tefft (Ed.), Secrecy (pp. 351). New York: Human Sciences Press.
    • (1980) Secrecy , pp. 351
    • Brandt, E.1
  • 14
    • 0002101493 scopus 로고
    • How shall a thing be called?
    • Brown, R. (1958). How shall a thing be called? Psychological Review, 65, 14-21.
    • (1958) Psychological Review , vol.65 , pp. 14-21
    • Brown, R.1
  • 15
    • 0011037464 scopus 로고
    • Public disclosure and the structure of private information
    • Bushman, R.M. (1991). Public disclosure and the structure of private information. Journal of Accounting Research, 29(2), 261-276.
    • (1991) Journal of Accounting Research , vol.29 , Issue.2 , pp. 261-276
    • Bushman, R.M.1
  • 16
    • 21844493501 scopus 로고
    • Timing the disclosure of information: Management's view of earnings announcements
    • Chen, C.R., & Mohan, N.J. (1994). Timing the disclosure of information: Management's view of earnings announcements. Financial Management, 23(3), 63-69.
    • (1994) Financial Management , vol.23 , Issue.3 , pp. 63-69
    • Chen, C.R.1    Mohan, N.J.2
  • 17
    • 38149148017 scopus 로고
    • Conflicting interests in information disclosure and shortterm orientation of firms
    • Chen, Y. (1994). Conflicting interests in information disclosure and shortterm orientation of firms. International Journal of Industrial Organization, 12(2), 211-225.
    • (1994) International Journal of Industrial Organization , vol.12 , Issue.2 , pp. 211-225
    • Chen, Y.1
  • 19
    • 84860082339 scopus 로고    scopus 로고
    • Retrieved December 2
    • Congressional Research Service. Retrieved December 2, 2003, from http://www.fas.org/irp/crs/rl31845.pdf
    • (2003)
  • 22
    • 0033418948 scopus 로고    scopus 로고
    • The end of secrecy: U.S. national security and the imperative for openness
    • Doyle, K. (1999). The end of secrecy: U.S. national security and the imperative for openness. World Policy Journal, 16(1), 34-51.
    • (1999) World Policy Journal , vol.16 , Issue.1 , pp. 34-51
    • Doyle, K.1
  • 23
    • 13844259681 scopus 로고    scopus 로고
    • Information security: A technical or human Domain?
    • May. Paper presented at the Toronto, Canada
    • Drake, P., & Clarke, S. C. (2001, May). Information security: A technical or human Domain? Paper presented at the Information Resources Management Association, Toronto, Canada.
    • (2001) Information Resources Management Association
    • Drake, P.1    Clarke, S.C.2
  • 26
    • 0001986928 scopus 로고
    • Content analysis, specification and control
    • Fairthorne, R.A. (1969). Content analysis, specification and control. ARIST, 4, 73-109.
    • (1969) ARIST , vol.4 , pp. 73-109
    • Fairthorne, R.A.1
  • 27
    • 13844289612 scopus 로고    scopus 로고
    • Former Anderson executive to testify
    • April 10
    • Farrell, G. (2002, April 10). Former Anderson executive to testify. USA Today, p. B1.
    • (2002) USA Today
    • Farrell, G.1
  • 28
    • 0030555635 scopus 로고    scopus 로고
    • Secrecy, trust, and dangerous leisure: Generating group cohesion in voluntary organizations
    • Fine, G.A., & Holyfield, L. (1996). Secrecy, trust, and dangerous leisure: Generating group cohesion in voluntary organizations. Social Psychology Quarterly, 59(1), 22-38.
    • (1996) Social Psychology Quarterly , vol.59 , Issue.1 , pp. 22-38
    • Fine, G.A.1    Holyfield, L.2
  • 29
    • 0027015012 scopus 로고
    • Using ethnography to build a working system: Rethinking basic design assumptions
    • November. Paper presented at the Baltimore, MD
    • Forsythe, D.E. (1992, November). Using ethnography to build a working system: Rethinking basic design assumptions. Paper presented at the 16th Annual Symposium on Computer Applications in Medical Care, Baltimore, MD.
    • (1992) 16th Annual Symposium on Computer Applications in Medical Care
    • Forsythe, D.E.1
  • 30
    • 0030549329 scopus 로고    scopus 로고
    • The strategic timing of corporate disclosures
    • Gennotte, G., & Trueman, B. (1996). The strategic timing of corporate disclosures. Review of Financial Studies, 9(2), 665-690.
    • (1996) Review of Financial Studies , vol.9 , Issue.2 , pp. 665-690
    • Gennotte, G.1    Trueman, B.2
  • 33
    • 85065630779 scopus 로고
    • The promises of monsters: A regenerative polities for inappropriated others
    • C.N.P. Treichler & L. Grossberg (Eds.), New York: Routledge
    • Haraway, D. (1992). The promises of monsters: A regenerative polities for inappropriated others. In C.N.P. Treichler & L. Grossberg (Eds.), Cultural studies now and in the future (pp. 295-335). New York: Routledge.
    • (1992) Cultural Studies Now and in the Future , pp. 295-335
    • Haraway, D.1
  • 34
    • 13844304016 scopus 로고    scopus 로고
    • Improving network-level security through real-time monitoring and intrusion detection
    • H.F.A.M.K. Tipton (Ed.), Boca Raton, FL: Auerbach Publications
    • Hare, C. (2001). Improving network-level security through real-time monitoring and intrusion detection. In H.F.A.M.K. Tipton (Ed.), Information security management handbook (4th ed., Vol. 2, pp. 569-595). Boca Raton, FL: Auerbach Publications.
    • (2001) Information Security Management Handbook (4th Ed.) , vol.2 , pp. 569-595
    • Hare, C.1
  • 35
    • 25044452594 scopus 로고    scopus 로고
    • Officials have known SUV tire suspicions for decades
    • August 2
    • Healy, J.R., & Nathan, S. (2000, August 2). Officials have known SUV tire suspicions for decades. USA Today, p. B1.
    • (2000) USA Today
    • Healy, J.R.1    Nathan, S.2
  • 36
    • 84860076704 scopus 로고    scopus 로고
    • Management takes notice
    • Retrieved September 30, 2001
    • Hulme, G.V. (2001). Management takes notice. Information Week. Retrieved September 30, 2001, from http://www.informationweek.com/story/IWK20010831S0014
    • (2001) Information Week
    • Hulme, G.V.1
  • 37
    • 78651074773 scopus 로고    scopus 로고
    • Enron case could be largest corporate forensics investigation
    • February 19
    • Iwata, E. (2002, February 19). Enron case could be largest corporate forensics investigation. USA Today, p. B1.
    • (2002) USA Today
    • Iwata, E.1
  • 38
    • 0007239427 scopus 로고
    • Classification and categorization: Drawing the line
    • October. Paper presented at the Washington, DC
    • Jacob, E.K. (1991, October). Classification and categorization: Drawing the line. Paper presented at the 2nd ASIS SIG/CR Classification Research Workshop, Washington, DC.
    • (1991) 2nd ASIS SIG/CR Classification Research Workshop
    • Jacob, E.K.1
  • 39
    • 0009340593 scopus 로고
    • Washington, DC: Joint Security Commission
    • Joint Security Commission. (1994). Redefining security. Washington, DC: Joint Security Commission.
    • (1994) Redefining Security
  • 41
    • 84986085537 scopus 로고    scopus 로고
    • More on myth, magic, and metaphor: Cultural insights into the management of information technology in organizations
    • Kaarst-Brown, M.L., and Robey, D. (1999). More on myth, magic, and metaphor: Cultural insights into the management of information technology in organizations. Information, Technology and People, 12(2).
    • (1999) Information, Technology and People , vol.12 , Issue.2
    • Kaarst-Brown, M.L.1    Robey, D.2
  • 42
    • 84930563007 scopus 로고
    • Sodot: Secret-sharing as a social form among Israeli children
    • Katriel, T. (1991). Sodot: Secret-sharing as a social form among Israeli children. Research on Languages and Social Interaction, 24, 141-157.
    • (1991) Research on Languages and Social Interaction , vol.24 , pp. 141-157
    • Katriel, T.1
  • 43
    • 0031593256 scopus 로고    scopus 로고
    • Pre-announcement and event period private information
    • Kim, O., & Verrecchia, R.E. (1997). Pre-announcement and event period private information. Journal of Accounting and Economics, 24(3), 395-419.
    • (1997) Journal of Accounting and Economics , vol.24 , Issue.3 , pp. 395-419
    • Kim, O.1    Verrecchia, R.E.2
  • 44
    • 0030900973 scopus 로고    scopus 로고
    • Information as regulation: The effect of community right to know laws on toxic emissions
    • Konar, S., & Cohen, M.A. (1997). Information as regulation: The effect of community right to know laws on toxic emissions. Journal of Environmental Economics and Management, 32(1), 109-124.
    • (1997) Journal of Environmental Economics and Management , vol.32 , Issue.1 , pp. 109-124
    • Konar, S.1    Cohen, M.A.2
  • 45
    • 0001364716 scopus 로고
    • The importance of factors that are not document attributes in the organization of personal documents
    • Kwasnik, B.H. (1991). The importance of factors that are not document attributes in the organization of personal documents. Journal of Documentation, 47(4), 389-398.
    • (1991) Journal of Documentation , vol.47 , Issue.4 , pp. 389-398
    • Kwasnik, B.H.1
  • 46
    • 0033449090 scopus 로고    scopus 로고
    • The role of classification in knowledge representation and discovery
    • Kwasnik, B.H. (1999). The role of classification in knowledge representation and discovery. Library Trends, 48(1), 22-47.
    • (1999) Library Trends , vol.48 , Issue.1 , pp. 22-47
    • Kwasnik, B.H.1
  • 47
    • 0038537796 scopus 로고
    • Bizango: A voodoo secret society in Haiti
    • S. Tefft (Ed.), New York: Human Sciences Press
    • Laguerre, M.S. (1980). Bizango: A voodoo secret society in Haiti. In S. Tefft (Ed.), Secrecy (pp. 351). New York: Human Sciences Press.
    • (1980) Secrecy , pp. 351
    • Laguerre, M.S.1
  • 48
    • 0031928404 scopus 로고    scopus 로고
    • Secrecy, anonymity, and deception in donor insemination: A genetic, psycho-social and ethical critique
    • Landau, R. (1998). Secrecy, anonymity, and deception in donor insemination: A genetic, psycho-social and ethical critique. Social Work in Health Care, 28(1), 75-89.
    • (1998) Social Work in Health Care , vol.28 , Issue.1 , pp. 75-89
    • Landau, R.1
  • 52
    • 84937292702 scopus 로고
    • Offshore secrecy centers and the necessary role of states: Bucking the trend
    • Maingot, A.P. (1995). Offshore secrecy centers and the necessary role of states: Bucking the trend. Journal of Interamerican Studies and World Affairs, 37(4), 1-24.
    • (1995) Journal of Interamerican Studies and World Affairs , vol.37 , Issue.4 , pp. 1-24
    • Maingot, A.P.1
  • 55
    • 0018057167 scopus 로고
    • Natural categories: Well defined or fuzzy sets?
    • McCloskey, M.E., & Glucksburg, S. (1978). Natural categories: Well defined or fuzzy sets? Memory and Cognition, 6, 462-472.
    • (1978) Memory and Cognition , vol.6 , pp. 462-472
    • McCloskey, M.E.1    Glucksburg, S.2
  • 56
    • 22644449475 scopus 로고    scopus 로고
    • Enculturation into secrecy among junior high school girls
    • Metten, D. (1999). Enculturation into secrecy among junior high school girls. Journal of Contemporary Ethnography, 28(2), 107-137.
    • (1999) Journal of Contemporary Ethnography , vol.28 , Issue.2 , pp. 107-137
    • Metten, D.1
  • 58
    • 0034335611 scopus 로고    scopus 로고
    • Intimate exchanges: Using computers to elicit self disclosure from consumers
    • Moon, Y. (2000). Intimate exchanges: Using computers to elicit self disclosure from consumers. Journal of Consumer Research, 26(4), 23-39.
    • (2000) Journal of Consumer Research , vol.26 , Issue.4 , pp. 23-39
    • Moon, Y.1
  • 59
    • 13844304017 scopus 로고    scopus 로고
    • Enterprise security architecture
    • H.F.A.M.K. Tipton (Ed.), Boca Raton, PL: Auerbach Publications
    • Murray, W.H. (2000). Enterprise security architecture. In H.F.A.M.K. Tipton (Ed.), Information security management handbook (4th ed., Vol. 1, pp. 215-230). Boca Raton, PL: Auerbach Publications.
    • (2000) Information Security Management Handbook (4th Ed.) , vol.1 , pp. 215-230
    • Murray, W.H.1
  • 60
    • 13844278550 scopus 로고    scopus 로고
    • House panel investigates leaks at FDA
    • June 10
    • O'Donnell, J. (2002, June 10), House panel investigates leaks at FDA. USA Today, p. B1.
    • (2002) USA Today
    • O'Donnell, J.1
  • 61
    • 0003208695 scopus 로고
    • Integrated information environment or matrix of control? The contradictory implications of information technology
    • Orlikowski, W.J. (1991). Integrated information environment or matrix of control? The contradictory implications of information technology. Accounting Management and Information Technology, 1(1), 9-42.
    • (1991) Accounting Management and Information Technology , vol.1 , Issue.1 , pp. 9-42
    • Orlikowski, W.J.1
  • 62
    • 0033196205 scopus 로고    scopus 로고
    • Acquisition and discretionary disclosure of private information and its implications for firms' productive activities
    • Pae, S. (1999). Acquisition and discretionary disclosure of private information and its implications for firms' productive activities. Journal of Accounting Research, 37(2), 465-474.
    • (1999) Journal of Accounting Research , vol.37 , Issue.2 , pp. 465-474
    • Pae, S.1
  • 63
    • 84929228330 scopus 로고
    • Telling the truth (up to a point): Radio communication among Maine lobstermen
    • Palmer, C.T. (1990). Telling the truth (up to a point): Radio communication among Maine lobstermen. Human Organization, 49(2), 157-163.
    • (1990) Human Organization , vol.49 , Issue.2 , pp. 157-163
    • Palmer, C.T.1
  • 64
    • 13844294705 scopus 로고    scopus 로고
    • Classification of information to protect it from loss
    • Parker, D.B. (1996). Classification of information to protect it from loss. Information Systems Security, 5(2), 9-15.
    • (1996) Information Systems Security , vol.5 , Issue.2 , pp. 9-15
    • Parker, D.B.1
  • 65
    • 13844278548 scopus 로고    scopus 로고
    • Information classification
    • Peltier, T.R. (1998). Information classification. Information Systems Security, 7(3), 31-43.
    • (1998) Information Systems Security , vol.7 , Issue.3 , pp. 31-43
    • Peltier, T.R.1
  • 67
    • 13844278549 scopus 로고    scopus 로고
    • Colorado Springs, CO: PoliVec Inc.
    • PoliVec. (2002). Security policy development process. Colorado Springs, CO: PoliVec Inc.
    • (2002) Security Policy Development Process
  • 69
    • 0031231907 scopus 로고    scopus 로고
    • The impact of secrecy and denial in adoption: Practice and treatment issues
    • Rosenberg, K.F., & Groze, V. (1997). The impact of secrecy and denial in adoption: Practice and treatment issues. Families in Society, 78(5), 522-530.
    • (1997) Families in Society , vol.78 , Issue.5 , pp. 522-530
    • Rosenberg, K.F.1    Groze, V.2
  • 71
    • 13844286369 scopus 로고
    • The management of secrecy: The Ku Klux Klan's successful secret
    • S. Tefft (Ed.), New York: Human Sciences
    • Schaefer, R.T. (1980). The management of secrecy: The Ku Klux Klan's successful secret. In S. Tefft (Ed.), Secrecy (pp. 161-177). New York: Human Sciences.
    • (1980) Secrecy , pp. 161-177
    • Schaefer, R.T.1
  • 72
    • 85140101909 scopus 로고
    • The symbolic value of computerized information systems
    • P. Gagliardi (Ed.), New York: Aldine de Gruyter
    • Scholz, C. (1990). The symbolic value of computerized information systems. In P. Gagliardi (Ed.), Symbols and artifacts: Views of the corporate landscape (pp. 233-254). New York: Aldine de Gruyter.
    • (1990) Symbols and Artifacts: Views of the Corporate Landscape , pp. 233-254
    • Scholz, C.1
  • 75
    • 0004206023 scopus 로고
    • (K.H. Wolff, Trans.). New York: The Free Press. (Original work published 1912)
    • Simmel, G. (1950). The sociology of Georg Simmel (K.H. Wolff, Trans.). New York: The Free Press. (Original work published 1912)
    • (1950) The Sociology of Georg Simmel
    • Simmel, G.1
  • 76
    • 0032281861 scopus 로고    scopus 로고
    • Grounded classification: Grounded theory and faceted classification
    • Star, S.L. (1998). Grounded classification: Grounded theory and faceted classification. Library Trends, 47(2), 218-232.
    • (1998) Library Trends , vol.47 , Issue.2 , pp. 218-232
    • Star, S.L.1
  • 77
    • 84860078408 scopus 로고    scopus 로고
    • Associated Press. Retrieved September 5, 2002
    • Study: Most support government web action. (2002). Associated Press. Retrieved September 5, 2002, from http://www.ap.org
    • (2002) Study: Most Support Government Web Action
  • 79
    • 0040832934 scopus 로고    scopus 로고
    • Information disclosure and voluntary contributions to public goods
    • Teoh, S.H. (1997). Information disclosure and voluntary contributions to public goods. RAND Journal of Economics, 28(3), 385-406.
    • (1997) RAND Journal of Economics , vol.28 , Issue.3 , pp. 385-406
    • Teoh, S.H.1
  • 84
    • 13844289610 scopus 로고    scopus 로고
    • Merrill-Lynch fires two bankers
    • September 19
    • Valdmanis, T. (2002, September 19). Merrill-Lynch fires two bankers. USA Today, p. B1.
    • (2002) USA Today
    • Valdmanis, T.1
  • 85
    • 84952414272 scopus 로고
    • Relevance assignment in discourse comprehension
    • Van Dijk, T.A. (1979). Relevance assignment in discourse comprehension. Discourse Processes, 2, 113-126.
    • (1979) Discourse Processes , vol.2 , pp. 113-126
    • Van Dijk, T.A.1
  • 86
    • 84993906406 scopus 로고
    • Privacy and secrecy: A conceptual comparison
    • Warren, C., & Laslett, B. (1977). Privacy and secrecy: A conceptual comparison. Journal of Social Issues, 33(3), 43-51.
    • (1977) Journal of Social Issues , vol.33 , Issue.3 , pp. 43-51
    • Warren, C.1    Laslett, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.