메뉴 건너뛰기




Volumn 15, Issue 4, 2005, Pages 339-375

Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods

Author keywords

[No Author keywords available]

Indexed keywords


EID: 24644436394     PISSN: 14717727     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infoandorg.2004.11.001     Document Type: Article
Times cited : (95)

References (78)
  • 1
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • R. Anderson Why cryptosystems fail Communication of the ACM 37 11 1993 32-44
    • (1993) Communication of the ACM , vol.37 , Issue.11 , pp. 32-44
    • Anderson, R.1
  • 3
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibilities and security of information systems
    • J. Backhouse & G. Dhillon Structures of responsibilities and security of information systems European Journal of Information Systems 5 1 1996 2-10
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-10
    • Backhouse, J.1    Dhillon, G.2
  • 5
    • 0003649193 scopus 로고
    • Designing information systems security
    • John Wiley Information Systems Series
    • R. Baskerville Designing information systems security John Wiley Information Systems Series 1988
    • (1988)
    • Baskerville, R.1
  • 6
    • 6744247045 scopus 로고
    • Logical controls specification: An approach to information systems security
    • North-Holland Amsterdam
    • R. Baskerville Logical controls specification: An approach to information systems security Systems Development for Human Progress 1989 North-Holland Amsterdam 241-256
    • (1989) Systems Development for Human Progress , pp. 241-256
    • Baskerville, R.1
  • 7
    • 0002082632 scopus 로고
    • The developmental duality of information systems security
    • R. Baskerville The developmental duality of information systems security Journal of Management Systems 4 1 1992 1-12
    • (1992) Journal of Management Systems , vol.4 , Issue.1 , pp. 1-12
    • Baskerville, R.1
  • 8
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • R. Baskerville Information systems security design methods: Implications for information systems development ACM Computing Surveys 25 4 1993 375-414
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 11
    • 0024012763 scopus 로고
    • A spiral model of software development and Enhancement
    • B.W. Boehm A spiral model of software development and Enhancement IEEE Computer 21 5 1988 61-72
    • (1988) IEEE Computer , vol.21 , Issue.5 , pp. 61-72
    • Boehm, B.W.1
  • 15
    • 0000130004 scopus 로고
    • Radical developments in accounting thought
    • W.F. Chua Radical developments in accounting thought Accounting Review 61 5 1986 583-598
    • (1986) Accounting Review , vol.61 , Issue.5 , pp. 583-598
    • Chua, W.F.1
  • 16
    • 0031535076 scopus 로고    scopus 로고
    • Case study principles for different types of cases
    • J.B. Cunningham Case study principles for different types of cases Quality and Quantity 31 1997 401-423
    • (1997) Quality and Quantity , vol.31 , pp. 401-423
    • Cunningham, J.B.1
  • 17
    • 0033262273 scopus 로고    scopus 로고
    • A research perspective for information systems and example of emerging area of research
    • G.B. Davis A research perspective for information systems and example of emerging area of research Information Systems Frontiers 1 1999 195-203
    • (1999) Information Systems Frontiers , vol.1 , pp. 195-203
    • Davis, G.B.1
  • 18
  • 19
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Toward socio-organizational perspectives
    • G. Dhillon & J. Backhouse Current directions in IS security research: Toward socio-organizational perspectives Information Systems Journal 11 2 2001 127-153
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 21
    • 0001073758 scopus 로고
    • Building theories from case study research
    • K.M. Eisenhardt Building theories from case study research Academy of Management Review 14 4 1989 532-550
    • (1989) Academy of Management Review , vol.14 , Issue.4 , pp. 532-550
    • Eisenhardt, K.M.1
  • 23
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: A hierarchical framework for various approaches
    • M.M. Eloff & S.H. Solms von Information security management: A hierarchical framework for various approaches Computers and Security 19 2000a 243-256
    • (2000) Computers and Security , vol.19 , pp. 243-256
    • Eloff, M.M.1    Solms, S.H.2
  • 24
    • 0002955225 scopus 로고
    • Choosing information systems research approach
    • R. Galliers (Ed.) Blackwell Scientific Publications Oxford, UK
    • R. Galliers Choosing information systems research approach In R. Galliers (Ed.) Information systems research: Issues, methods and practical guidelines 1992 Blackwell Scientific Publications Oxford, UK 144-162
    • (1992) Information Systems Research: Issues, Methods and Practical Guidelines , pp. 144-162
    • Galliers, R.1
  • 25
    • 84976814937 scopus 로고
    • Choosing appropriate information systems research methodologies
    • R.D. Galliers & F.F. Land Choosing appropriate information systems research methodologies Communication of the ACM 30 11 1987 900-902
    • (1987) Communication of the ACM , vol.30 , Issue.11 , pp. 900-902
    • Galliers, R.D.1    Land, F.F.2
  • 26
    • 0001823869 scopus 로고
    • Security concerns of systems users: A study of perceptions of the adequacy of security measures
    • D.L. Goodhue & D.W. Straub Security concerns of systems users: A study of perceptions of the adequacy of security measures Information and Management 20 1 1991 13-27
    • (1991) Information and Management , vol.20 , Issue.1 , pp. 13-27
    • Goodhue, D.L.1    Straub, D.W.2
  • 29
    • 0001886449 scopus 로고
    • IS epistemology: An historical perspective
    • E. Mumford (Ed.) North-Holland The Netherlands
    • R. Hirschheim IS epistemology: An historical perspective In: E. Mumford (Ed.) Research methods in information systems 1985 North-Holland The Netherlands 13-36
    • (1985) Research Methods in Information Systems , pp. 13-36
    • Hirschheim, R.1
  • 31
    • 84897583836 scopus 로고    scopus 로고
    • Exploring the intellectual structures of information systems development: A social action theoretic analysis
    • R. Hirschheim H.K. Klein & K. Lyytinen Exploring the intellectual structures of information systems development: A social action theoretic analysis Accounting, Management and Information Technologies 6 1-2 1996 1-64
    • (1996) Accounting, Management and Information Technologies , vol.6 , Issue.1-2 , pp. 1-64
    • Hirschheim, R.1    Klein, H.K.2    Lyytinen, K.3
  • 34
    • 0023984512 scopus 로고
    • Characterizing the software process: A maturity framework
    • W.S. Humphrey Characterizing the software process: A maturity framework IEEE Software 5 2 1988 73-79
    • (1988) IEEE Software , vol.5 , Issue.2 , pp. 73-79
    • Humphrey, W.S.1
  • 36
    • 0001214077 scopus 로고
    • A paradigmatic analysis of contemporary schools of IS development
    • J. Iivari A paradigmatic analysis of contemporary schools of IS development European Journal of Information Systems 1 4 1991 249-272
    • (1991) European Journal of Information Systems , vol.1 , Issue.4 , pp. 249-272
    • Iivari, J.1
  • 37
    • 0030286609 scopus 로고    scopus 로고
    • Analyzing information systems development: A comparison and analysis of eight is development approaches
    • J. Iivari & R. Hirschheim Analyzing information systems development: a comparison and analysis of eight is development approaches Information Systems 21 7 1996 551-575
    • (1996) Information Systems , vol.21 , Issue.7 , pp. 551-575
    • Iivari, J.1    Hirschheim, R.2
  • 38
    • 0032334755 scopus 로고    scopus 로고
    • A paradigmatic analysis contrasting information systems development approaches and methodologies
    • J. Iivari R. Hirschheim & H.K. Klein A paradigmatic analysis contrasting information systems development approaches and methodologies Information Systems Research 9 2 1998 164-193
    • (1998) Information Systems Research , vol.9 , Issue.2 , pp. 164-193
    • Iivari, J.1    Hirschheim, R.2    Klein, H.K.3
  • 39
    • 0034434529 scopus 로고    scopus 로고
    • A dynamic framework for classifying information systems development methodologies and approaches
    • J. Iivari R. Hirschheim & H.K. Klein A dynamic framework for classifying information systems development methodologies and approaches Journal of Management Information Systems 17 3 2001 179-218
    • (2001) Journal of Management Information Systems , vol.17 , Issue.3 , pp. 179-218
    • Iivari, J.1    Hirschheim, R.2    Klein, H.K.3
  • 40
    • 0002165187 scopus 로고
    • A Sociocybernetic framework for the feature analysis of information
    • T.W. Olle H.G. Sol & C.J. Tully (Eds.) North-Holland The Netherlands
    • J. Iivari & P. Kerola A Sociocybernetic framework for the feature analysis of information In T.W. Olle H.G. Sol & C.J. Tully (Eds.) Information systems design methodologies: A feature analysis 1983 North-Holland The Netherlands 87-139
    • (1983) Information Systems Design Methodologies: A Feature Analysis , pp. 87-139
    • Iivari, J.1    Kerola, P.2
  • 42
    • 0003209474 scopus 로고
    • Research methodologies and MIS research
    • E. Mumford et al. (Ed.) Elsevier Science Publisher B.V. (North Holland)
    • M.A. Jenkins Research methodologies and MIS research In E. Mumford et al. (Ed.) Research methodologies in information systems 1985 Elsevier Science Publisher B.V. (North Holland) 103-117
    • (1985) Research Methodologies in Information Systems , pp. 103-117
    • Jenkins, M.A.1
  • 43
    • 24644436684 scopus 로고    scopus 로고
    • Research questions guiding selection of an appropriate research method
    • Hansen Bichler & Mahrer (Eds.) 3-5 July Vienna University of Economics and Business Adminstration Wien
    • P. Järvinen Research questions guiding selection of an appropriate research method In Hansen Bichler & Mahrer (Eds.) Proceedings of ECIS2000, 3-5 July 2000 Vienna University of Economics and Business Adminstration Wien 124-131
    • (2000) Proceedings of ECIS2000 , pp. 124-131
    • Järvinen, P.1
  • 46
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • H.K. Klein & M.D. Myers A set of principles for conducting and evaluating interpretive field studies in information systems MIS Quarterly 23 1 1999 67-94
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 67-94
    • Klein, H.K.1    Myers, M.D.2
  • 47
    • 0019608720 scopus 로고
    • Formal models for computer security
    • C.E. Landwehr Formal models for computer security ACM Computing Survey 13 3 1981 247-278
    • (1981) ACM Computing Survey , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 48
    • 0029537737 scopus 로고
    • Design and natural science research on information technology
    • S.T. March & G.G. Smith Design and natural science research on information technology Decision Support Systems 15 4 1995 251-266
    • (1995) Decision Support Systems , vol.15 , Issue.4 , pp. 251-266
    • March, S.T.1    Smith, G.G.2
  • 49
    • 0033170370 scopus 로고    scopus 로고
    • Software engineering research: A critical appraisal
    • Aug
    • J.A. McDermid & K.H. Bennett Software engineering research: A critical appraisal IEE Proceedings of Software 146 4, Aug. 1999 179-186
    • (1999) IEE Proceedings of Software , vol.146 , Issue.4 , pp. 179-186
    • McDermid, J.A.1    Bennett, K.H.2
  • 51
    • 85101726600 scopus 로고
    • An Investigation into the Use and Usefulness of Security Software in Detecting Computer Abuse
    • J.I. DeGloss and M.H. Olson (eds.), Minneapolis, MN, 1988
    • Nance, W.D., & Straub, D.W. (1988). An Investigation into the Use and Usefulness of Security Software in Detecting Computer Abuse. Proceedings of the Ninth International Conference on Information Systems, J.I. DeGloss and M.H. Olson (eds.), Minneapolis, MN, 1988, pp. 283-294.
    • (1988) Proceedings of the Ninth International Conference on Information Systems , pp. 283-294
    • Nance, W.D.1    Straub, D.W.2
  • 53
    • 0031120791 scopus 로고    scopus 로고
    • Teamwork: Computational science and applied mathematics
    • April-June
    • D.P. O'Leary Teamwork: Computational science and applied mathematics IEEE Computational Science and Engineering 4 2, April-June 1997 13-18
    • (1997) IEEE Computational Science and Engineering , vol.4 , Issue.2 , pp. 13-18
    • O'Leary, D.P.1
  • 54
    • 0033349272 scopus 로고    scopus 로고
    • Software engineering programs are not computer science programs
    • Nov.-Dec
    • D.L. Parnas Software engineering programs are not computer science programs IEEE Software 16 6, Nov.-Dec 1999 19-30
    • (1999) IEEE Software , vol.16 , Issue.6 , pp. 19-30
    • Parnas, D.L.1
  • 58
    • 0032595617 scopus 로고    scopus 로고
    • Albert Einstein and empirical software engineering
    • S.H. Pfleeger Albert Einstein and empirical software engineering IEEE Computer 32 10 1999 32-37
    • (1999) IEEE Computer , vol.32 , Issue.10 , pp. 32-37
    • Pfleeger, S.H.1
  • 59
    • 0003159917 scopus 로고
    • Normal science and its dangers
    • I. Lakatos & A. Musgrave (Eds.) Cambridge University Press UK
    • K.R. Popper Normal science and its dangers In I. Lakatos & A. Musgrave (Eds.) Criticism and the growth of knowledge 1970 Cambridge University Press UK 51-58
    • (1970) Criticism and the Growth of Knowledge , pp. 51-58
    • Popper, K.R.1
  • 60
    • 0342561553 scopus 로고    scopus 로고
    • COPS: A model and infrastructure for secure and fair electronic markets
    • A.W. Röhm & G. Pernul COPS: A model and infrastructure for secure and fair electronic markets Decision Support Systems 29 4 2000 434-455
    • (2000) Decision Support Systems , vol.29 , Issue.4 , pp. 434-455
    • Röhm, A.W.1    Pernul, G.2
  • 61
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • A. Sasse S. Brostoff & D. Weirich Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security BT Technology Journal 19 3 2001 122-131
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, A.1    Brostoff, S.2    Weirich, D.3
  • 62
    • 0033923437 scopus 로고    scopus 로고
    • Software engineering: Community and culture
    • Jan.-Feb
    • H. Sharp H. Robinson & M. Woodman Software engineering: Community and culture IEEE Software 17 1, Jan.-Feb. 2000 40-47
    • (2000) IEEE Software , vol.17 , Issue.1 , pp. 40-47
    • Sharp, H.1    Robinson, H.2    Woodman, M.3
  • 63
    • 8744290801 scopus 로고    scopus 로고
    • Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice
    • M.T. Siponen Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice Information Management and Computer Security 8 5 2000 197-209
    • (2000) Information Management and Computer Security , vol.8 , Issue.5 , pp. 197-209
    • Siponen, M.T.1
  • 64
    • 84904255922 scopus 로고    scopus 로고
    • A new paradigm for adding security into IS development methods
    • J. Eloff L. Labuschagne R. von Solms & G. Dhillon (Eds.) Kluwer Academic Publishers MA
    • M.T. Siponen & R. Baskerville A new paradigm for adding security into IS development methods In J. Eloff L. Labuschagne R. von Solms & G. Dhillon (Eds.) Advances in information security management and small systems security 2001 Kluwer Academic Publishers MA 99-111
    • (2001) Advances in Information Security Management and Small Systems Security , pp. 99-111
    • Siponen, M.T.1    Baskerville, R.2
  • 65
    • 4644234503 scopus 로고    scopus 로고
    • Unauthorized copying of software and levels of moral development: Implications for research and practice
    • M.T. Siponen & T. Vartiainen Unauthorized copying of software and levels of moral development: Implications for research and practice Information Systems Journal 14 4 2004 387-407
    • (2004) Information Systems Journal , vol.14 , Issue.4 , pp. 387-407
    • Siponen, M.T.1    Vartiainen, T.2
  • 67
    • 0001897127 scopus 로고    scopus 로고
    • Information security management: Why standards are important
    • R. Solms von Information security management: Why standards are important Information Management and Computer Security 7 1 1999 50-58
    • (1999) Information Management and Computer Security , vol.7 , Issue.1 , pp. 50-58
    • Solms, R.1
  • 69
    • 55249123249 scopus 로고
    • Validating Instruments in MIS Research
    • D.W. Straub Validating Instruments in MIS Research MIS Quarterly 13 2 1989 147-169
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147-169
    • Straub, D.W.1
  • 70
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • D.W. Straub Effective IS security: An empirical study Information System Research 1 2 1990 255-277
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 71
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • D.W. Straub & R.J. Welke Coping with systems risk: Security planning models for management decision making MIS Quarterly 22 4 1998 441-464
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 74
  • 75
    • 73549100231 scopus 로고    scopus 로고
    • The Emergence of Interpretivism in IS research
    • G. Walsham The Emergence of Interpretivism in IS research Information Systems Research 6 4 1996 376-394
    • (1996) Information Systems Research , vol.6 , Issue.4 , pp. 376-394
    • Walsham, G.1
  • 76
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the past to prepare for future: Writing a literature review
    • J. Webster & R.T. Watson Analyzing the past to prepare for future: writing a literature review MIS Quarterly 6 2 2002 xiii-xxii
    • (2002) MIS Quarterly , vol.6 , Issue.2
    • Webster, J.1    Watson, R.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.