메뉴 건너뛰기




Volumn 13, Issue 4, 2005, Pages 297-310

Information systems security issues and decisions for small businesses: An empirical examination

Author keywords

Communications technologies; Data security; Information systems; Small enterprises

Indexed keywords

ELECTRONIC COMMERCE; INDUSTRY; INFORMATION TECHNOLOGY; INTERNET; LOCAL AREA NETWORKS; SOCIETIES AND INSTITUTIONS;

EID: 24144453387     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220510614425     Document Type: Article
Times cited : (83)

References (20)
  • 1
    • 2142832387 scopus 로고    scopus 로고
    • "The perceived threats to the security of computerized accounting information systems"
    • Abu-Musa, A.A. (2003), "The perceived threats to the security of computerized accounting information systems", Journal of American Academy of Business, Vol. 1 No. 2, pp. 9-20.
    • (2003) Journal of American Academy of Business , vol.1 , Issue.2 , pp. 9-20
    • Abu-Musa, A.A.1
  • 2
  • 3
    • 84994184536 scopus 로고
    • "Computer security issues in small and medium-sized enterprises"
    • Ban, L. and Heng, G. (1995), "Computer security issues in small and medium-sized enterprises", Singapore Management Review, Vol. 17 No. 1, pp. 15-30.
    • (1995) Singapore Management Review , vol.17 , Issue.1 , pp. 15-30
    • Ban, L.1    Heng, G.2
  • 4
    • 22244470742 scopus 로고    scopus 로고
    • "The impact of IT on SMEs in the United States"
    • Beheshti, H.M. (2004), "The impact of IT on SMEs in the United States", Information Management & Computer Security, Vol. 12 No. 4, pp. 318-27.
    • (2004) Information Management & Computer Security , vol.12 , Issue.4 , pp. 318-327
    • Beheshti, H.M.1
  • 6
    • 33645589662 scopus 로고    scopus 로고
    • "A prototype tool for information security awareness and training"
    • Furnell, S.M., Gennatou, M. and Dowland, P.S. (2002), "A prototype tool for information security awareness and training", Logistics Information Management, Vol. 15 Nos 5/6, pp. 352-7.
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 352-357
    • Furnell, S.M.1    Gennatou, M.2    Dowland, P.S.3
  • 7
    • 0042363394 scopus 로고    scopus 로고
    • "Quantifying the financial impact of IT security breaches"
    • Garg, A., Curtis, J. and Halper, H. (2003), "Quantifying the financial impact of IT security breaches", Information Management & Computer Security, Vol. 11 No. 2, pp. 74-83.
    • (2003) Information Management & Computer Security , vol.11 , Issue.2 , pp. 74-83
    • Garg, A.1    Curtis, J.2    Halper, H.3
  • 8
    • 21144459480 scopus 로고
    • "Expert systems development in small business: A managerial perspective"
    • Hebert, F. and Bradley, J. (1993), "Expert systems development in small business: A managerial perspective", Journal of Small Business Management, Vol. 31 No. 3, pp. 23-35.
    • (1993) Journal of Small Business Management , vol.31 , Issue.3 , pp. 23-35
    • Hebert, F.1    Bradley, J.2
  • 10
    • 0005692985 scopus 로고
    • "Computer security: Who's minding the store?"
    • Knotts, R. and Richards, T. (1989), "Computer security: Who's minding the store?", The Academy of Management Executive, Vol. 3 No. 1, pp. 63-6.
    • (1989) The Academy of Management Executive , vol.3 , Issue.1 , pp. 63-66
    • Knotts, R.1    Richards, T.2
  • 11
    • 0038035157 scopus 로고    scopus 로고
    • "Guarding the cyberfort"
    • Krause, J. (2003), "Guarding the cyberfort", ABA Journal, Vol. 89, pp. 42-6.
    • (2003) ABA Journal , vol.89 , pp. 42-46
    • Krause, J.1
  • 12
    • 33645589941 scopus 로고    scopus 로고
    • "Developing sound security policies"
    • 30 June
    • Lei, T.A. (2003), "Developing sound security policies", Asia Computer Weekly, 30 June, p. 1.
    • (2003) Asia Computer Weekly , pp. 1
    • Lei, T.A.1
  • 13
    • 1642501482 scopus 로고    scopus 로고
    • "Information security practices and experiences in small businesses"
    • Unpublished Dissertation, George Washington University
    • Ryan, J.J.C. (2000), "Information security practices and experiences in small businesses", Unpublished Dissertation, George Washington University.
    • (2000)
    • Ryan, J.J.C.1
  • 14
    • 33645599051 scopus 로고    scopus 로고
    • "Betting students will be drawn to ethical hacking"
    • Sisk, M. (2003), "Betting students will be drawn to ethical hacking", US Banker, Vol. 113 No. 6, p. 12.
    • (2003) US Banker , vol.113 , Issue.6 , pp. 12
    • Sisk, M.1
  • 15
    • 0036036094 scopus 로고    scopus 로고
    • "Issues in cybersecurity; understanding the potential risks associated with hackers/crackers"
    • Smith, A.D. and Rupp, W.T. (2002), "Issues in cybersecurity; understanding the potential risks associated with hackers/crackers", Information Management & Computer Security, Vol. 10 No. 4, pp. 178-83.
    • (2002) Information Management & Computer Security , vol.10 , Issue.4 , pp. 178-183
    • Smith, A.D.1    Rupp, W.T.2
  • 16
    • 84993070579 scopus 로고    scopus 로고
    • "Information technology in the small business: Establishing the basis for a management information system"
    • Smith, J. (1999), "Information technology in the small business: establishing the basis for a management information system", Journal of Small Business and Enterprise Development, Vol. 6 No. 4, pp. 326-40.
    • (1999) Journal of Small Business and Enterprise Development , vol.6 , Issue.4 , pp. 326-340
    • Smith, J.1
  • 17
    • 0003168891 scopus 로고    scopus 로고
    • "Security requirements, risks and recommendations for small enterprise and home-office environments"
    • Spinellis, D., Kokolakis, S. and Gritzalis, S. (1999), "Security requirements, risks and recommendations for small enterprise and home-office environments", Information Management & Computer Security, Vol. 7 No. 3, pp. 121-8.
    • (1999) Information Management & Computer Security , vol.7 , Issue.3 , pp. 121-128
    • Spinellis, D.1    Kokolakis, S.2    Gritzalis, S.3
  • 18
    • 33645584432 scopus 로고    scopus 로고
    • "IT security issues"
    • Wakefield, R. (2002), "IT security issues", The CPA Journal, Vol. 72 No. 11, pp. 55-6.
    • (2002) The CPA Journal , vol.72 , Issue.11 , pp. 55-56
    • Wakefield, R.1
  • 19
    • 18844449069 scopus 로고    scopus 로고
    • "Security practice: Survey evidence from three countries"
    • Warren, M.J. (2002), "Security practice: Survey evidence from three countries", Logistics Information Management, Vol. 15 Nos 5/6, pp. 347-51.
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 347-351
    • Warren, M.J.1
  • 20
    • 33645601173 scopus 로고    scopus 로고
    • "Preparing your business for secure e-commerce"
    • Williams, K. (2000), "Preparing your business for secure e-commerce", Strategic Finance, Vol. 82 No. 3, p. 21.
    • (2000) Strategic Finance , vol.82 , Issue.3 , pp. 21
    • Williams, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.