메뉴 건너뛰기




Volumn 24, Issue 6, 2005, Pages 448-459

Information security policy's impact on reporting security incidents

Author keywords

Computer abuse; Deterrence; Incidents; Medical records; Policy; Security; Seriousness

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; HEALTH CARE; HOSPITALS; PATIENT MONITORING; PUBLIC POLICY;

EID: 24644439555     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.03.008     Document Type: Article
Times cited : (46)

References (61)
  • 1
    • 71549159679 scopus 로고
    • Six top information systems issues
    • Anon. Six top information systems issues EDP Analyzer 23 1 Jan 1985 1 12
    • (1985) EDP Analyzer , vol.23 , Issue.1 , pp. 1-12
  • 2
    • 0024717026 scopus 로고
    • Framework of a methodology for the life cycle of computer security in an organization
    • K.P. Badenhorst, and J.H.P. Eloff Framework of a methodology for the life cycle of computer security in an organization Computers and Security 8 5 August 1989 433 442
    • (1989) Computers and Security , vol.8 , Issue.5 , pp. 433-442
    • Badenhorst, K.P.1    Eloff, J.H.P.2
  • 3
    • 0002122064 scopus 로고
    • SMIS member: A membership analysis
    • L. Ball, and R. Harris SMIS member: a membership analysis MIS Quarterly 6 1 March 1982 19 38
    • (1982) MIS Quarterly , vol.6 , Issue.1 , pp. 19-38
    • Ball, L.1    Harris, R.2
  • 7
    • 55249089317 scopus 로고
    • Key issues in information systems: 1986
    • J. Brancheau, and J.C. Wetherbe Key issues in information systems: 1986 MIS Quarterly 11 1 March 1987 23 45
    • (1987) MIS Quarterly , vol.11 , Issue.1 , pp. 23-45
    • Brancheau, J.1    Wetherbe, J.C.2
  • 8
    • 9744281201 scopus 로고    scopus 로고
    • Key issues in information systems management: 1994-95 SIM Delphi results
    • J.C. Brancheau, B.D. Janz, and J.C. Wetherbe Key issues in information systems management: 1994-95 SIM Delphi results MIS Quarterly 20 2 June 1996 225 242
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 225-242
    • Brancheau, J.C.1    Janz, B.D.2    Wetherbe, J.C.3
  • 10
    • 0344212319 scopus 로고    scopus 로고
    • Governments find information pays
    • R. Chandrasekaran Governments find information pays Washington Post March 9, 1998 A1, A12
    • (1998) Washington Post
    • Chandrasekaran, R.1
  • 12
    • 24644478393 scopus 로고    scopus 로고
    • How to keep prying eyes off your medical records
    • Carol Marie Cropper How to keep prying eyes off your medical records Business Week November 19, 2001 130 132
    • (2001) Business Week , pp. 130-132
    • Carol Marie, C.1
  • 13
    • 0029547159 scopus 로고
    • A methodology for the design of security plans
    • W.F. De Koning A methodology for the design of security plans Computers and Security 14 7 1995 633 643
    • (1995) Computers and Security , vol.14 , Issue.7 , pp. 633-643
    • De Koning, W.F.1
  • 17
    • 24644511484 scopus 로고
    • Keeping the lid on secrets
    • Lance J. Ewing Keeping the lid on secrets Risk Management 39 November 1992 18
    • (1992) Risk Management , vol.39 , pp. 18
    • Ewing Lance, J.1
  • 18
    • 24644439523 scopus 로고
    • Information security: More than money alone
    • Jack W. Farrell Information security: more than money alone Traffic Management 17 8 Aug. 1978 42 44
    • (1978) Traffic Management , vol.17 , Issue.8 , pp. 42-44
    • Farrell Jack, W.1
  • 19
    • 0030417096 scopus 로고    scopus 로고
    • The information security chain in a company
    • Thomas Finne The information security chain in a company Computers and Security 15 1996 297
    • (1996) Computers and Security , vol.15 , pp. 297
    • Thomas, F.1
  • 22
    • 84989598473 scopus 로고
    • The right of privacy in the age of computer data and processing
    • R. Freedman The right of privacy in the age of computer data and processing Texas Tech Law Review 13 1982 1361 1363
    • (1982) Texas Tech Law Review , vol.13 , pp. 1361-1363
    • Freedman, R.1
  • 26
    • 15744391114 scopus 로고    scopus 로고
    • NIST special publication 800-61. National Institute of Standards and Technology; January
    • Grance Tim, Kent Karen, Kim Brian. Computer security incident handling guide, NIST special publication 800-61. National Institute of Standards and Technology; January 2004.
    • (2004) Computer Security Incident Handling Guide
    • Tim, G.1    Karen, K.2    Brian, K.3
  • 27
    • 55249121963 scopus 로고
    • 1985 Opinion survey of MIS managers: Key issues
    • C. Hartlog, and M. Herbert 1985 Opinion survey of MIS managers: key issues MIS Quarterly 10 4 December 1986 351 361
    • (1986) MIS Quarterly , vol.10 , Issue.4 , pp. 351-361
    • Hartlog, C.1    Herbert, M.2
  • 28
    • 0011418384 scopus 로고
    • Integrating data security into the systems development life cycle
    • Avraham Hayam, and Effy Oz Integrating data security into the systems development life cycle Journal of Systems Management August 1993 16
    • (1993) Journal of Systems Management , pp. 16
    • Avraham, H.1    Effy, O.2
  • 29
    • 84982723008 scopus 로고
    • Information security: An overview and resource guide for information managers
    • Lisa B. Hill, and Michael Pemberton Information security: an overview and resource guide for information managers Records Management Quarterly January 1995 14
    • (1995) Records Management Quarterly , pp. 14
    • Hill Lisa, B.1    Michael, P.2
  • 30
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Jeffrey A. Hoffer, and Detmar W. Straub The 9 to 5 underground: are you policing computer crimes? Sloan Management Review 30 4 Summer 1989 35
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35
    • Hoffer Jeffrey, A.1    Straub Detmar, W.2
  • 32
    • 85021329238 scopus 로고
    • Some minimum requirements for legal sanctioning systems with special emphasis on detection
    • Alfred Blumstein Jacqueline Cohen Daniel Nagin National Academy of Sciences Washington, D.C.
    • Hans Kletee Some minimum requirements for legal sanctioning systems with special emphasis on detection Alfred Blumstein Jacqueline Cohen Daniel Nagin Deterrence and incapacitation: estimating the effects of criminal sanctions on crime rates 1975 National Academy of Sciences Washington, D.C.
    • (1975) Deterrence and Incapacitation: Estimating the Effects of Criminal Sanctions on Crime Rates
    • Hans, K.1
  • 33
    • 0030671775 scopus 로고    scopus 로고
    • Information warfare and the information systems security professional
    • Gerald L. Kovacich Information warfare and the information systems security professional Computers and Security 16 1997 19
    • (1997) Computers and Security , vol.16 , pp. 19
    • Kovacich Gerald, L.1
  • 35
    • 0034418444 scopus 로고    scopus 로고
    • Information privacy: Corporate management and national regulation
    • Sandra J. Milberg, H. Jeff Smith, and Sandra J. Burke Information privacy: corporate management and national regulation Organization Science 11 1 January-February 2000 35 57
    • (2000) Organization Science , vol.11 , Issue.1 , pp. 35-57
    • Milberg Sandra, J.1    Jeff, S.H.2    Burke Sandra, J.3
  • 36
    • 24044502721 scopus 로고
    • Information systems management issues for the 1990's
    • F. Niederman, J.C. Brancheau, and J.C. Wetherbe Information systems management issues for the 1990's MISS Quarterly 15 4 December 1991 475 495
    • (1991) MISS Quarterly , vol.15 , Issue.4 , pp. 475-495
    • Niederman, F.1    Brancheau, J.C.2    Wetherbe, J.C.3
  • 37
    • 0007172591 scopus 로고    scopus 로고
    • Drug plans keep tabs on patients' medication
    • R. O'Harrow Drug plans keep tabs on patients' medication Washington Post September 27, 1998 A1, A26
    • (1998) Washington Post
    • O'Harrow, R.1
  • 40
    • 0021425587 scopus 로고
    • The many faces of data vulnerability
    • Donn B. Parker The many faces of data vulnerability IEEE Spectrum 21 5 May 1984 46 49
    • (1984) IEEE Spectrum , vol.21 , Issue.5 , pp. 46-49
    • Parker Donn, B.1
  • 41
    • 0022301472 scopus 로고
    • Toward an integration of criminological theories
    • F.S. Pearson, and N.A. Weiner Toward an integration of criminological theories Journal of Crime and Criminology 76 1 Winter 1985 116 150
    • (1985) Journal of Crime and Criminology , vol.76 , Issue.1 , pp. 116-150
    • Pearson, F.S.1    Weiner, N.A.2
  • 44
    • 24644523158 scopus 로고
    • Holistic approach needed for healthy security program
    • Ralph Spencer Poore Holistic approach needed for healthy security program Computing Canada 6 25 Dec 9, 1980 7
    • (1980) Computing Canada , vol.6 , Issue.25 , pp. 7
    • Ralph Spencer, P.1
  • 45
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, information technology, and health care
    • Thomas Rindfleisch Privacy, information technology, and health care Communications of the ACM 40 8 1997 92 100
    • (1997) Communications of the ACM , vol.40 , Issue.8 , pp. 92-100
    • Thomas, R.1
  • 46
    • 24644444077 scopus 로고
    • Computing security risk analysis: Is it worth it?
    • James A. Schweitzer Computing security risk analysis: is it worth it? Security Management 25 8 Aug 1981 104 106
    • (1981) Security Management , vol.25 , Issue.8 , pp. 104-106
    • Schweitzer James, A.1
  • 47
    • 0027805822 scopus 로고
    • Privacy policies and practices: Inside the organizational maze
    • H. Jeff Smith Privacy policies and practices: inside the organizational maze Communications of the ACM 36 12 1993 105 122
    • (1993) Communications of the ACM , vol.36 , Issue.12 , pp. 105-122
    • Jeff Smith, H.1
  • 49
    • 0000981743 scopus 로고    scopus 로고
    • Information privacy: Measuring individuals' concerns about organizational practices
    • H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke Information privacy: measuring individuals' concerns about organizational practices MIS Quarterly 20 2 1996 167 196
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 167-196
    • Jeff, S.H.1    Milberg Sandra, J.2    Burke Sandra, J.3
  • 50
    • 24644473900 scopus 로고    scopus 로고
    • Overview of HIPAA: Implementation of the HIPAA laws and regulations, patient rights under HIPAA
    • Medical Educational Services, Inc.
    • Paul English Smith Overview of HIPAA: implementation of the HIPAA laws and regulations, patient rights under HIPAA HIPAA, medical record compliance and the e-revolution 2001 Medical Educational Services, Inc. 2001 Edition, Copyright 2001
    • (2001) HIPAA, Medical Record Compliance and the E-revolution
    • Paul English, S.1
  • 53
    • 53349102510 scopus 로고
    • Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
    • Detmar W. Straub Jr., and Rosann Webb Collins Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy MIS Quarterly 14 2 Jun 01 1990 143
    • (1990) MIS Quarterly , vol.14 , Issue.2 , pp. 143
    • Straub Jr., D.W.1    Collins, R.W.2
  • 54
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Detmar W. Straub Jr., and William D. Nance Discovering and disciplining computer abuse in organizations: a field study MIS Quarterly 14 1 Mar 01, 1990 45
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45
    • Straub Jr., D.W.1    Nance, W.D.2
  • 55
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision-making
    • Detmar W. Straub, and Richard J. Welke Coping with systems risk: security planning models for management decision-making MIS Quarterly 22 4 Dec 01, 1998 441
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441
    • Straub Detmar, W.1    Welke Richard, J.2
  • 57
    • 55249123249 scopus 로고
    • Validating instruments in MIS research
    • Detmar W. Straub Jr. Validating instruments in MIS research MIS Quarterly 13 2 June 1989 147
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147
    • Straub Jr., D.W.1
  • 58
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • Detmar W. Straub Jr. Effective is security: an empirical study Information Systems Research 1 3 Sep 01, 1990 255
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255
    • Straub Jr., D.W.1
  • 59
    • 8744241162 scopus 로고
    • Deterring highly motivated computer abusers: A field experiment in computer security
    • G.G. Gable W.J. Caelli North-Holland Amsterdam
    • D.W. Straub, P.J. Carlson, and E.H. Jones Deterring highly motivated computer abusers: a field experiment in computer security G.G. Gable W.J. Caelli IT security: the need for international cooperation 1992 North-Holland Amsterdam 309 324
    • (1992) IT Security: The Need for International Cooperation , pp. 309-324
    • Straub, D.W.1    Carlson, P.J.2    Jones, E.H.3
  • 60
    • 0141463342 scopus 로고
    • Deterring cheating by student programmers: A field experiment in computer security
    • D.W. Straub, P.J. Carlson, and E.H. Jones Deterring cheating by student programmers: a field experiment in computer security Journal of Management Systems 5 1 1993 33 48
    • (1993) Journal of Management Systems , vol.5 , Issue.1 , pp. 33-48
    • Straub, D.W.1    Carlson, P.J.2    Jones, E.H.3
  • 61
    • 24644512031 scopus 로고
    • Personnel security policy critical to dispel risk
    • J. Van Duyn Personnel security policy critical to dispel risk Computerworld 17 48 Nov 28, 1983 9 10 Special report
    • (1983) Computerworld , vol.17 , Issue.48 , pp. 9-10
    • Van Duyn, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.