메뉴 건너뛰기




Volumn 24, Issue 2, 2005, Pages 124-133

Analysis of end user security behaviors

Author keywords

Behavioral information security; Computer security; Organizational management; Passwords; Surveys; User behavior

Indexed keywords

FINANCE; INFORMATION SERVICES; INFORMATION TECHNOLOGY; INTERFACES (COMPUTER); MAPS; RISK ASSESSMENT; SOCIETIES AND INSTITUTIONS;

EID: 17844366573     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2004.07.001     Document Type: Article
Times cited : (512)

References (21)
  • 3
    • 0035063716 scopus 로고    scopus 로고
    • Violation of safeguards by trusted personnel and understanding related information security concerns
    • G. Dhillon Violation of safeguards by trusted personnel and understanding related information security concerns Computers and Security 20 2001 165 172
    • (2001) Computers and Security , vol.20 , pp. 165-172
    • Dhillon, G.1
  • 4
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • G. Dhillon, and J. Backhouse Information system security management in the new millennium Communications of the ACM 43 2000 125 128
    • (2000) Communications of the ACM , vol.43 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 7
    • 0030194196 scopus 로고    scopus 로고
    • Evaluating ethical decision-making and computer use
    • K.D. Loch, and S. Conger Evaluating ethical decision-making and computer use Communications of the ACM 39 7 1996 74 83
    • (1996) Communications of the ACM , vol.39 , Issue.7 , pp. 74-83
    • Loch, K.D.1    Conger, S.2
  • 8
    • 0033896875 scopus 로고    scopus 로고
    • Incidence and correlates of pathological Internet use among college students
    • J. Morahan-Martin, and P. Schumacher Incidence and correlates of pathological Internet use among college students Computers in Human Behavior 16 1 2000 13 29
    • (2000) Computers in Human Behavior , vol.16 , Issue.1 , pp. 13-29
    • Morahan-Martin, J.1    Schumacher, P.2
  • 9
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • E.E. Schultz A framework for understanding and predicting insider attacks Computers and Security 21 6 2002 526 531
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 13
    • 85001555189 scopus 로고    scopus 로고
    • On the role of human morality in information systems security
    • M.T. Siponen On the role of human morality in information systems security Information Resources Management Journal 14 4 2001 15 23
    • (2001) Information Resources Management Journal , vol.14 , Issue.4 , pp. 15-23
    • Siponen, M.T.1
  • 16
    • 0242537133 scopus 로고    scopus 로고
    • Company profile of the frequent Internet user: Web addict or happy employee?
    • J.M. Stanton Company profile of the frequent Internet user: Web addict or happy employee? Communications of the Association for Computing Machinery 45 1 2002 55 59
    • (2002) Communications of the Association for Computing Machinery , vol.45 , Issue.1 , pp. 55-59
    • Stanton, J.M.1
  • 17
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • D.W. Straub Effective IS security: an empirical study Information System Research 1 2 1990 255 277
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 19
    • 0034926180 scopus 로고    scopus 로고
    • A framework for the implementation of socio-ethical controls in information security
    • C.M. Trompeters, and J.H.P. Eloff A framework for the implementation of socio-ethical controls in information security Computers and Security 20 2001 384 391
    • (2001) Computers and Security , vol.20 , pp. 384-391
    • Trompeters, C.M.1    Eloff, J.H.P.2
  • 20
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • C. Vroom, and R. von Solms Towards information security behavioural compliance Computers and Security 23 3 2004 191 198
    • (2004) Computers and Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 21
    • 3042869109 scopus 로고    scopus 로고
    • Internet addition: The emergence of a new clinical disorder
    • K.S. Young Internet addition: the emergence of a new clinical disorder CyberPsychology and Behavior 1 3 1998 237 244
    • (1998) CyberPsychology and Behavior , vol.1 , Issue.3 , pp. 237-244
    • Young, K.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.