메뉴 건너뛰기




Volumn 24, Issue 3, 2005, Pages 246-260

Information systems security policies: A contextual perspective

Author keywords

Contextualism; Information systems; Security awareness; Security policy adoption; Security policy implementation

Indexed keywords

DYNAMICS; INFORMATION MANAGEMENT; PUBLIC POLICY; RISKS; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS; STATISTICAL METHODS;

EID: 18844431067     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2004.08.011     Document Type: Article
Times cited : (116)

References (33)
  • 5
    • 55249084997 scopus 로고
    • The case research strategy in studies in information systems
    • I. Benbasat, D. Goldstein, and M. Mead The case research strategy in studies in information systems MIS Quarterly 1987 369 386
    • (1987) MIS Quarterly , pp. 369-386
    • Benbasat, I.1    Goldstein, D.2    Mead, M.3
  • 8
    • 0001073758 scopus 로고
    • Building theories from case study research
    • K. Eisenhardt Building theories from case study research Academy of Management Review 14 4 1989 532 550
    • (1989) Academy of Management Review , vol.14 , Issue.4 , pp. 532-550
    • Eisenhardt, K.1
  • 9
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: A hierarchical framework for various approaches
    • M. Eloff, and S. von Solms Information security management: a hierarchical framework for various approaches Computers and Security 19 3 2000 243 256
    • (2000) Computers and Security , vol.19 , Issue.3 , pp. 243-256
    • Eloff, M.1    Von Solms, S.2
  • 10
    • 0031373349 scopus 로고    scopus 로고
    • A baseline security policy for distributed healthcare information systems
    • D. Gritzalis A baseline security policy for distributed healthcare information systems Computers and Security 16 8 1997 709 719
    • (1997) Computers and Security , vol.16 , Issue.8 , pp. 709-719
    • Gritzalis, D.1
  • 11
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy - What do international information security standards say?
    • K. Höne, and J. Eloff Information security policy - what do international information security standards say? Computers and Security 21 5 2002 402 409
    • (2002) Computers and Security , vol.21 , Issue.5 , pp. 402-409
    • Höne, K.1    Eloff, J.2
  • 12
    • 0036613095 scopus 로고    scopus 로고
    • What makes an effective security policy?
    • K. Höne, and J. Eloff What makes an effective security policy? Network Security 6 1 2002 14 16
    • (2002) Network Security , vol.6 , Issue.1 , pp. 14-16
    • Höne, K.1    Eloff, J.2
  • 13
    • 24644436684 scopus 로고    scopus 로고
    • Research questions guiding selection of an appropriate research method
    • H.R. Hansen M. Bichler H. Maher Vienna University of Economics and Business Administration
    • P. Jarvinen Research questions guiding selection of an appropriate research method H.R. Hansen M. Bichler H. Maher Proceedings of the eighth European conference on information systems 2000 Vienna University of Economics and Business Administration
    • (2000) Proceedings of the Eighth European Conference on Information Systems
    • Jarvinen, P.1
  • 16
  • 18
    • 84980310861 scopus 로고
    • Context and action in the transformation of the firm
    • A. Pettigrew Context and action in the transformation of the firm Journal of Management Studies 24 6 1987 649 670
    • (1987) Journal of Management Studies , vol.24 , Issue.6 , pp. 649-670
    • Pettigrew, A.1
  • 21
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • M. Siponen A conceptual foundation for organizational information security awareness Information Management and Computer Security 8 1 2000 31 41
    • (2000) Information Management and Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 22
    • 18844398752 scopus 로고    scopus 로고
    • Policies for construction of information systems' security guidelines
    • S. Qing J.H.P. Eloff Kluwer Academic Publishers
    • M. Siponen Policies for construction of information systems' security guidelines S. Qing J.H.P. Eloff Information security for global information infrastructures 2000 Kluwer Academic Publishers 112 120
    • (2000) Information Security for Global Information Infrastructures , pp. 112-120
    • Siponen, M.1
  • 24
    • 0001403574 scopus 로고
    • A review of information systems evaluation: Content, context and process
    • V. Symons A review of information systems evaluation: content, context and process Journal of Information Systems 1 3 1991 205 212
    • (1991) Journal of Information Systems , vol.1 , Issue.3 , pp. 205-212
    • Symons, V.1
  • 25
    • 0034926180 scopus 로고    scopus 로고
    • A framework for the implementation of socio-ethical controls in information security
    • C. Trompeter, and J. Eloff A framework for the implementation of socio-ethical controls in information security Computers and Security 20 5 2001 384 391
    • (2001) Computers and Security , vol.20 , Issue.5 , pp. 384-391
    • Trompeter, C.1    Eloff, J.2
  • 26
    • 18844415452 scopus 로고    scopus 로고
    • UK Central Computer and Telecommunications Agency HMSO London
    • UK Central Computer and Telecommunications Agency CCTA risk analysis and management method: user manual 2002 HMSO London Version 5.0
    • (2002) CCTA Risk Analysis and Management Method: User Manual
  • 27
    • 84974872728 scopus 로고
    • Interpretive case studies in IS research: Nature and method
    • G. Walsham Interpretive case studies in IS research: nature and method European Journal of Information Systems 4 1995 74 81
    • (1995) European Journal of Information Systems , vol.4 , pp. 74-81
    • Walsham, G.1
  • 28
    • 0028408489 scopus 로고
    • Information systems strategy and implementation: A case study of a building society
    • G. Walsham, and T. Waema Information systems strategy and implementation: a case study of a building society ACM Transactions on Information Systems 12 2 1994 150 173
    • (1994) ACM Transactions on Information Systems , vol.12 , Issue.2 , pp. 150-173
    • Walsham, G.1    Waema, T.2
  • 29
    • 18844449069 scopus 로고    scopus 로고
    • Security practice: Survey evidence from three countries
    • M. Warren Security practice: survey evidence from three countries Logistics Information Management 15 5/6 2002 347 351
    • (2002) Logistics Information Management , vol.15 , Issue.56 , pp. 347-351
    • Warren, M.1
  • 32
    • 18844458431 scopus 로고    scopus 로고
    • An unappreciated reason why security policies fail
    • C. Wood An unappreciated reason why security policies fail Computer Fraud and Security 10 2000 13 14
    • (2000) Computer Fraud and Security , vol.10 , pp. 13-14
    • Wood, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.