메뉴 건너뛰기




Volumn 22, Issue 2, 2005, Pages 7-19

Information security threats and practices in small businesses

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER SOFTWARE; DATA PRIVACY; INDUSTRY; INFORMATION TECHNOLOGY; INTERCONNECTION NETWORKS; INTERNET; MANAGEMENT INFORMATION SYSTEMS; TELECOMMUNICATION SERVICES;

EID: 15844405077     PISSN: 10580530     EISSN: None     Source Type: Journal    
DOI: 10.1201/1078/45099.22.2.20050301/87273.2     Document Type: Article
Times cited : (53)

References (35)
  • 1
    • 15844377478 scopus 로고    scopus 로고
    • Auditing E-Business: New Challenges for External Auditors
    • Abu-Musa, Ahmad. 2004. Auditing E-Business:New Challenges for External Auditors. Journal of American Academy of Business, 4 (1):28–41.
    • (2004) Journal of American Academy of Business , vol.4 , Issue.1 , pp. 28-41
    • Abu-Musa, A.1
  • 2
    • 85023805301 scopus 로고    scopus 로고
    • Accessed 23 July 2004
    • American Express. 22 October 2002. OPEN Small Business Network Semi-Annual Monitor, Accessed 23 July 2004 http://home3.americanexpress.com/corp/latestnews/osbnm2002.asp
    • (2002) OPEN Small Business Network Semi-Annual Monitor
  • 3
    • 85023843531 scopus 로고    scopus 로고
    • By-passing JavaScript Filters—The Flash! Attack
    • Anonymous Accessed 27 July 2004
    • 25 August 2002. By-passing JavaScript Filters—The Flash! Attack. Eye on Security, Anonymous Accessed 27 July 2004 http://eyeonsecurity.org/papers/flash-xss.pdf
    • (2002) Eye on Security
  • 5
    • 2342598277 scopus 로고    scopus 로고
    • Computer Security Impaired by Legitimate Users
    • Besnard, Denis, and Budi, Arief. 2004. Computer Security Impaired by Legitimate Users. Computers & Security, 23:253–264.
    • (2004) Computers & Security , vol.23 , pp. 253-264
    • Besnard, D.1    Budi, A.2
  • 8
    • 84876641036 scopus 로고    scopus 로고
    • All-Out Blitz against Web App Attacks
    • Accessed 1 June 2004
    • Desmond, Paul. 17 May 2004. All-Out Blitz against Web App Attacks. Network World Fusion, Accessed 1 June 2004 http://www.nwfusion. com/techinsider/2004/0517techinsidermain. html
    • (2004) Network World Fusion
    • Desmond, P.1
  • 9
    • 84876594147 scopus 로고    scopus 로고
    • Symantec CEO Warns of New Threats
    • Accessed 25 July 2004
    • Dubie, Denise. 25 November 2003. Symantec CEO Warns of New Threats. Network World Fusion, Accessed 25 July 2004 http://www. nwfusion.com/newsletters/ecomm/2003/1124ecom1.html
    • (2003) Network World Fusion
    • Dubie, D.1
  • 10
    • 84876605594 scopus 로고    scopus 로고
    • Top Five Myths about Safe Surfing
    • December 9
    • Erlanger, Leon. 2003. Top Five Myths about Safe Surfing. PC Magazine,:84 December 9
    • (2003) PC Magazine , pp. 84
    • Erlanger, L.1
  • 11
    • 33744996371 scopus 로고    scopus 로고
    • Accessed 24 July 2004
    • Ernst and Young. 9 July 2003. 2003 Global Information Security Survey, Accessed 24 July 2004 http://www.ey.com/global/Content.nsf/US/Issues_Perspectives_-_Library_-_Overview
    • (2003) 2003 Global Information Security Survey
    • Ernst1    Young2
  • 12
    • 33744996371 scopus 로고    scopus 로고
    • Accessed 18 October 2004
    • Ernst and Young. September 2004. 2004 Global Information Security Survey, Accessed 18 October 2004 http://www.ey.com/global/content.nsf/us/issues_perspectives_-Library_-_Overview
    • (2004) 2004 Global Information Security Survey
    • Ernst1    Young2
  • 13
    • 4444337196 scopus 로고    scopus 로고
    • Firewall Follies
    • Garfinkel, Simson. 2002. Firewall Follies. Technology Review, 105 (7):33
    • (2002) Technology Review , vol.105 , Issue.7 , pp. 33
    • Garfinkel, S.1
  • 16
    • 85023877607 scopus 로고    scopus 로고
    • Compsec Online, Accessed 25 July 2004
    • Hilley, Sarah. 2 October 2003. Virus Writers Faster to the Kill, Compsec Online. Accessed 25 July 2004 http://www.compseconline.com/analysis/031002.nesesymantecthreat.html
    • (2003) Virus Writers Faster to the Kill
    • Hilley, S.1
  • 18
    • 1242263532 scopus 로고    scopus 로고
    • Why There Aren't More Information Security Research Studies
    • Kotulic, Andrew, and Clark, Jan Guynes. May 2004. Why There Aren't More Information Security Research Studies. Information & Management, 41 (5):597–607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.1    Clark, J.G.2
  • 19
    • 0034513874 scopus 로고    scopus 로고
    • Intrusion Confinement by Isolation in Information Systems
    • Liu, Peng, Jajodia, Sushil, and McCollum, Catherine. 2000. Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security, 8 (4):243–280.
    • (2000) Journal of Computer Security , vol.8 , Issue.4 , pp. 243-280
    • Liu, P.1    Jajodia, S.2    McCollum, C.3
  • 20
    • 84876647837 scopus 로고    scopus 로고
    • Accessed 12 October 2004
    • Microsoft. 2004. Security Guidance Center for Small Businesses, Accessed 12 October 2004. http://www.microsoft.com/smallbusinesses/gtm/securityguidance/hub.mspx
    • (2004) Security Guidance Center for Small Businesses
  • 22
    • 3142628548 scopus 로고    scopus 로고
    • Privacy versus Cybersecurity
    • Phillips, John. 2002. Privacy versus Cybersecurity. Information Management Journal, 36 (3):46–50.
    • (2002) Information Management Journal , vol.36 , Issue.3 , pp. 46-50
    • Phillips, J.1
  • 23
    • 84876650185 scopus 로고    scopus 로고
    • Crime Fighters Cast Wide Net
    • Piazza, Peter. June 2004. Crime Fighters Cast Wide Net. Security Management, 48:119–126.
    • (2004) Security Management , vol.48 , pp. 119-126
    • Piazza, P.1
  • 24
    • 0041983746 scopus 로고    scopus 로고
    • Management Tradeoffs in Anti-Virus Strategies
    • Post, Gerald, and Kagan, Albert. 2000. Management Tradeoffs in Anti-Virus Strategies. Information & Management, 37:13–24.
    • (2000) Information & Management , vol.37 , pp. 13-24
    • Post, G.1    Kagan, A.2
  • 25
    • 15844371952 scopus 로고    scopus 로고
    • The Virus Wars
    • July 6
    • Robbins, Alexandra. 2004. The Virus Wars. PC Magazine, July 6:114
    • (2004) PC Magazine , pp. 114
    • Robbins, A.1
  • 26
    • 1242263792 scopus 로고    scopus 로고
    • Security Training and Awareness—Fitting a Square Peg in a Round Hole
    • Schultz, Eugene. 2004. Security Training and Awareness—Fitting a Square Peg in a Round Hole. Computers & Security, 23:1–2.
    • (2004) Computers & Security , vol.23 , pp. 1-2
    • Schultz, E.1
  • 27
    • 84876662435 scopus 로고    scopus 로고
    • Eradicating Spyware in the Enterprise
    • Accessed 22 July 2004
    • Schwartz, Mathew. 21 July 2004. Eradicating Spyware in the Enterprise. Enterprise Systems, Accessed 22 July 2004 http://www.esj.com/News/article.asp?EditorialsID=1050
    • (2004) Enterprise Systems
    • Schwartz, M.1
  • 29
    • 84876641020 scopus 로고    scopus 로고
    • Overlooked Best Practices
    • August 26
    • Udell, Jon. 2002. Overlooked Best Practices. InfoWorld, 24 August 26:44
    • (2002) InfoWorld , vol.24 , pp. 44
    • Udell, J.1
  • 30
    • 84876612554 scopus 로고    scopus 로고
    • Testing Disaster Reocvery Plans
    • Vasaris, A. J., 2004. Testing Disaster Reocvery Plans. Digits, http://www.digits.com/articlss/backup—testing-disaster-recovery-plans.htm
    • (2004) Digits
    • Vasaris, A.J.1
  • 31
    • 2342475711 scopus 로고    scopus 로고
    • Towards Information Security Behavioural Compliance
    • Vroom, Cheryl, and Rossouw, vonSolms. 2004. Towards Information Security Behavioural Compliance. Computers & Security, 23:191–198.
    • (2004) Computers & Security , vol.23 , pp. 191-198
    • Vroom, C.1    Rossouw, V.2
  • 32
    • 84876615279 scopus 로고    scopus 로고
    • Blended Threats
    • Weafer, Vincent. 2002. Blended Threats. T.H.E. Journal, 30 (5):16
    • (2002) T.H.E. Journal , vol.30 , Issue.5 , pp. 16
    • Weafer, V.1
  • 33
    • 84876603394 scopus 로고    scopus 로고
    • Sidebar: Security and QoS Lexicon
    • January 19
    • Wexler, Jonie. 2004. Sidebar:Security and QoS Lexicon. Computerworld, 38 January 19:40
    • (2004) Computerworld , vol.38 , pp. 40
    • Wexler, J.1
  • 34
    • 0035780470 scopus 로고    scopus 로고
    • Controlling Corporate E-mail, PC Use and Computer Security
    • White, Gayle Webb, and Pearson, Sheila. 2001. Controlling Corporate E-mail, PC Use and Computer Security. Information Management & Computer Security, 9 (2/3):88–92.
    • (2001) Information Management & Computer Security , vol.9 , Issue.2-3 , pp. 88-92
    • White, G.W.1    Pearson, S.2
  • 35
    • 1242265154 scopus 로고    scopus 로고
    • In Defense of the Realm: Understanding the Threats to Information Security
    • Whitman, Michael E., 2004. In Defense of the Realm:Understanding the Threats to Information Security. International Journal of Information Management, 24:43–57.
    • (2004) International Journal of Information Management , vol.24 , pp. 43-57
    • Whitman, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.