메뉴 건너뛰기




Volumn 24, Issue 6, 2005, Pages 472-484

The insider threat to information systems and the effectiveness of ISO17799

Author keywords

Computer misuse; Criminology theories; Insider threat; IS security management; ISO17799

Indexed keywords

COMPUTER CRIME; SECURITY OF DATA; SECURITY SYSTEMS; STANDARDS;

EID: 24644470542     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.05.002     Document Type: Article
Times cited : (186)

References (37)
  • 1
    • 0028811312 scopus 로고
    • Testing the leading crime theories: An alternative strategy focusing on motivational process
    • R. Agnew Testing the leading crime theories: an alternative strategy focusing on motivational process Journal of Research in Crime and Delinquency 32 4 1995 363 398
    • (1995) Journal of Research in Crime and Delinquency , vol.32 , Issue.4 , pp. 363-398
    • Agnew, R.1
  • 3
    • 0035999319 scopus 로고    scopus 로고
    • Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behaviour
    • I. Ajzen Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behaviour Journal of Applied Social Psychology 32 2002 665 683
    • (2002) Journal of Applied Social Psychology , vol.32 , pp. 665-683
    • Ajzen, I.1
  • 7
    • 0001323143 scopus 로고
    • Situational crime prevention: Theory and practice
    • R.V. Clarke Situational crime prevention: theory and practice British Journal of Criminology 20 1980 136 137
    • (1980) British Journal of Criminology , vol.20 , pp. 136-137
    • Clarke, R.V.1
  • 8
    • 24644501524 scopus 로고    scopus 로고
    • U.S. Department of Defense
    • Department of Defense, Insider Threat Integrated Process Team (DoD-ITIPT) DoD insider threat mitigation 2000 U.S. Department of Defense Available online at http://www.defenselink.mil/c3i/org/sio/iptreport4_26dbl.doc [accessed 01-Apr-05]
    • (2000) DoD Insider Threat Mitigation
  • 9
    • 24644494525 scopus 로고    scopus 로고
    • Department of Trade and Industry Information security breaches 2004 Available online at http://www.dti.gov.uk/industry_files/pdf/isbs_2004v3.pdf 2004 [accessed 01-Apr-05]
    • (2004) Information Security Breaches 2004
  • 10
    • 0035658603 scopus 로고    scopus 로고
    • Computer crimes: Theorizing about the enemy within
    • G. Dhillon, and S. Moores Computer crimes: theorizing about the enemy within Computers and Security 20 8 2001 715 723
    • (2001) Computers and Security , vol.20 , Issue.8 , pp. 715-723
    • Dhillon, G.1    Moores, S.2
  • 11
    • 0004326526 scopus 로고    scopus 로고
    • 4th ed. Polity Press Cambridge, UK
    • A. Giddens Sociology 4th ed. 2001 Polity Press Cambridge, UK
    • (2001) Sociology
    • Giddens, A.1
  • 12
    • 0037228072 scopus 로고    scopus 로고
    • The law, cybercrime, risk assessment and cyber protection
    • S. Hinde The law, cybercrime, risk assessment and cyber protection Computers and Security 22 2 2003 90 95
    • (2003) Computers and Security , vol.22 , Issue.2 , pp. 90-95
    • Hinde, S.1
  • 13
    • 0003991890 scopus 로고
    • University of California Press Berkeley, CA
    • T. Hirschi Causes of delinquency 1969 University of California Press Berkeley, CA
    • (1969) Causes of Delinquency
    • Hirschi, T.1
  • 14
    • 84928445565 scopus 로고
    • Acts against the workplace: Social bonding and employee deviance
    • R.C. Hollinger Acts against the workplace: social bonding and employee deviance Deviant Behaviour 7 1986 53 75
    • (1986) Deviant Behaviour , vol.7 , pp. 53-75
    • Hollinger, R.C.1
  • 15
    • 0343001536 scopus 로고
    • Crime by computer: Correlates of software piracy and unauthorized account access
    • R.C. Hollinger Crime by computer: correlates of software piracy and unauthorized account access Security Journal 4 1 1993 2 12
    • (1993) Security Journal , vol.4 , Issue.1 , pp. 2-12
    • Hollinger, R.C.1
  • 16
    • 0036330173 scopus 로고    scopus 로고
    • Information security policy - What do international information security standards say?
    • K. Höne, and J.H. Eloff Information security policy - what do international information security standards say? Computers and Security 21 5 2002 402 409
    • (2002) Computers and Security , vol.21 , Issue.5 , pp. 402-409
    • Höne, K.1    Eloff, J.H.2
  • 18
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • J. Leach Improving user security behaviour Computers and Security 22 8 2003 685 692
    • (2003) Computers and Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 19
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organisations
    • J. Lee, and Y. Lee A holistic model of computer abuse within organisations Information Management and Computer Security 10 2 2002 57 63
    • (2002) Information Management and Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 20
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • S.M. Lee, S. Lee, and Y. Sangjin An integrative model of computer abuse based on social control and general deterrence theories Information and Management 41 6 2003 707 718
    • (2003) Information and Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.2    Sangjin, Y.3
  • 21
    • 24344460927 scopus 로고    scopus 로고
    • A preliminary model of end user sophistication for insider threat prediction in IT systems
    • in press. doi:10.1016/j.cose.2004.10.003
    • Magklaras GB, Furnell SM. A preliminary model of end user sophistication for insider threat prediction in IT systems, Computers and Security, in press. doi:10.1016/j.cose.2004.10.003.
    • Computers and Security
    • Magklaras, G.B.1    Furnell, S.M.2
  • 26
    • 0037390453 scopus 로고    scopus 로고
    • Insider fraud: Spotting the wolf in sheep's clothing
    • D. Porter Insider fraud: spotting the wolf in sheep's clothing Computer Fraud and Security 2003 4 2003 12 15
    • (2003) Computer Fraud and Security , vol.2003 , Issue.4 , pp. 12-15
    • Porter, D.1
  • 27
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • E.E. Schultz A framework for understanding and predicting insider attacks Computers and Security 21 6 2002 526 531
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 28
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer abuse among college students
    • W.F. Skinner, and A.M. Fream A social learning theory analysis of computer abuse among college students Journal of Research in Crime and Delinquency 34 4 1997 495 518
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 30
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • D.W. Straub Effective IS security: an empirical study Information System Research 1 3 1990 255 276
    • (1990) Information System Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 31
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • D.W. Straub, and R.J. Welke Coping with systems risk: security planning models for management decision making MIS Quarterly 22 4 1998 441 465
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-465
    • Straub, D.W.1    Welke, R.J.2
  • 32
    • 0003805614 scopus 로고
    • J.B. Lippincott Philadelphia
    • E. Sutherland Criminology 1924 J.B. Lippincott Philadelphia
    • (1924) Criminology
    • Sutherland, E.1
  • 33
    • 0008390093 scopus 로고    scopus 로고
    • A preliminary structural approach to insider computer misuse incidents
    • Brussels, Belgium; March
    • Tuglular T. A preliminary structural approach to insider computer misuse incidents. In: Proceedings of EICAR 2000 international conference, Brussels, Belgium; March 2000.
    • (2000) Proceedings of EICAR 2000 International Conference
    • Tuglular, T.1
  • 34
    • 0030554013 scopus 로고    scopus 로고
    • Misbehavior in organisations: A motivational framework
    • Y. Vardi, and Y. Wiener Misbehavior in organisations: a motivational framework Organization Science 7 2 1996 151 165
    • (1996) Organization Science , vol.7 , Issue.2 , pp. 151-165
    • Vardi, Y.1    Wiener, Y.2
  • 36
    • 12344260478 scopus 로고    scopus 로고
    • Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminological theory to the IS security context
    • Willison R. Understanding the offender/environment dynamic for computer crimes: assessing the feasibility of applying criminological theory to the IS security context. In: Proceedings of the 37th Hawaii international conference on system sciences; 2004.
    • (2004) Proceedings of the 37th Hawaii International Conference on System Sciences
    • Willison, R.1
  • 37
    • 24644478392 scopus 로고    scopus 로고
    • An insider threat model for adversary simulation
    • R. Anderson T. Bozek T. Longstaff W. Meitzler M. Skroch K. van Wyk RAND Publ. Santa Monica, CA
    • B.J. Wood An insider threat model for adversary simulation R. Anderson T. Bozek T. Longstaff W. Meitzler M. Skroch K. van Wyk Research on mitigating the insider threat to information systems - #2 2000 RAND Publ. Santa Monica, CA
    • (2000) Research on Mitigating the Insider Threat to Information Systems - #2
    • Wood, B.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.