메뉴 건너뛰기




Volumn 14, Issue 1, 2006, Pages 24-36

Information security: Management's effect on culture and policy

Author keywords

Information control; Management effectiveness; Organizational culture; Surveys

Indexed keywords

LAW ENFORCEMENT; MATHEMATICAL MODELS; PROFESSIONAL ASPECTS; PUBLIC POLICY; SECURITY OF DATA;

EID: 33644533141     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220610648355     Document Type: Article
Times cited : (188)

References (29)
  • 1
    • 33644528527 scopus 로고
    • "Danger ahead! Safeguard your computer"
    • November/December
    • Allen, B. (1968), "Danger ahead! Safeguard your computer", Harvard Business Review, pp. 97-101, November/December.
    • (1968) Harvard Business Review , pp. 97-101
    • Allen, B.1
  • 2
    • 30744434347 scopus 로고    scopus 로고
    • "An analysis of the growth of computer and internet security breaches"
    • Bagchi, K. and Udo, G. (2003), "An analysis of the growth of computer and internet security breaches", Communications of the Association for Information Systems, Vol. 12 No. 46, pp. 1-29.
    • (2003) Communications of the Association for Information Systems , vol.12 , Issue.46 , pp. 1-29
    • Bagchi, K.1    Udo, G.2
  • 5
    • 33644519719 scopus 로고    scopus 로고
    • "CERT statistics"
    • Computer Emergency Response Team (CERT) available at: www.cert.org/stats/ cert_stats.html#incidents (accessed May 2004)
    • Computer Emergency Response Team (CERT) (2004), "CERT statistics", available at: www.cert.org/stats/ certa_stats.html#incidents (accessed May 2004).
    • (2004)
  • 6
    • 0034335593 scopus 로고    scopus 로고
    • "A framework for linking culture and improvement in organizations"
    • Detert, J.R., Schroeder, R.G. and Mauriel, J.J. (2000), "A framework for linking culture and improvement in organizations", Academy of Management Review, Vol. 25 No. 4, pp. 850-63.
    • (2000) Academy of Management Review , vol.25 , Issue.4 , pp. 850-863
    • Detert, J.R.1    Schroeder, R.G.2    Mauriel, J.J.3
  • 8
    • 0036765493 scopus 로고    scopus 로고
    • "Management's role in information security in a cyber economy"
    • Dutta, A. and McCrohan, K. (2002), "Management's role in information security in a cyber economy", California Management Review, Vol. 45 No. 1, pp. 67-87.
    • (2002) California Management Review , vol.45 , Issue.1 , pp. 67-87
    • Dutta, A.1    McCrohan, K.2
  • 9
    • 0042363394 scopus 로고    scopus 로고
    • "Quantifying the financial impact of IT security breaches"
    • Garg, A., Curtis, J. and Halper, H. (2004), "Quantifying the financial impact of IT security breaches", Information Management & Computer Security, Vol. 11 No. 2, pp. 74-83.
    • (2004) Information Management & Computer Security , vol.11 , Issue.2 , pp. 74-83
    • Garg, A.1    Curtis, J.2    Halper, H.3
  • 13
    • 0003054486 scopus 로고    scopus 로고
    • "A brief tutorial on the development of measures for use in survey questionnaires"
    • Hinkin, T.R. (1998), "A brief tutorial on the development of measures for use in survey questionnaires", Organizational Research Methods, Vol. 1 No. 1, pp. 104-121.
    • (1998) Organizational Research Methods , vol.1 , Issue.1 , pp. 104-121
    • Hinkin, T.R.1
  • 14
    • 62949227625 scopus 로고    scopus 로고
    • "The use of structural equation modeling in IS research: Review and recommendations"
    • Whitman, M.E. Hershey, PA Whitman, M.E. and Woszczynski, A.B. (Eds), Idea Group Publishing, Hershey, PA
    • Im, K.S. and Grover, V. (2004), "The use of structural equation modeling in IS research: Review and recommendations", in Whitman, M.E. and Woszczynski, A.B. (Eds), The Handbook of Information Systems Research, Idea Group Publishing, Hershey, PA.
    • (2004) The Handbook of Information Systems Research
    • Im, K.S.1    Grover, V.2
  • 16
    • 55249113766 scopus 로고
    • "Combining qualitative and quantitative methods in information systems research: A case study"
    • Kaplan, B. and Duchon, D. (1988), "Combining qualitative and quantitative methods in information systems research: A case study", Management Information Systems Quarterly, Vol. 12 No. 4, pp. 571-87.
    • (1988) Management Information Systems Quarterly , vol.12 , Issue.4 , pp. 571-587
    • Kaplan, B.1    Duchon, D.2
  • 17
    • 84973709223 scopus 로고
    • "Organization culture, distribution, and amount of control and perceptions of quality"
    • Klein, A.S., Masi, R.J. and Weidner, C.K. (1995), "Organization culture, distribution, and amount of control and perceptions of quality", Group & Organization Management, Vol. 20 No. 2, pp. 122-48.
    • (1995) Group & Organization Management , vol.20 , Issue.2 , pp. 122-148
    • Klein, A.S.1    Masi, R.J.2    Weidner, C.K.3
  • 19
    • 1242263532 scopus 로고    scopus 로고
    • "Why there aren't more information security research studies?"
    • Kotulic, A.G. and Clark, J.G. (2004), "Why there aren't more information security research studies?", Information & Management, Vol. 41 No. 5, pp. 597-607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 23
    • 0344559509 scopus 로고    scopus 로고
    • "National strategy to secure cyberspace"
    • President available at: www.whitehouse.gov/pcipb (accessed May 2004)
    • President (2003), "National strategy to secure cyberspace", available at: www.whitehouse.gov/pcipb (accessed May 2004).
    • (2003)
  • 24
    • 9744262493 scopus 로고    scopus 로고
    • "Strategic information systems planning success: An investigation of the construct and its measurement"
    • Segars, A.H. (1998), "Strategic information systems planning success: An investigation of the construct and its measurement", Management Information Systems Quarterly, Vol. 22 No. 2, pp. 139-63.
    • (1998) Management Information Systems Quarterly , vol.22 , Issue.2 , pp. 139-163
    • Segars, A.H.1
  • 25
    • 0000280419 scopus 로고
    • "Effective IS security: An empirical study"
    • Straub, D.W. (1990), "Effective IS security: An empirical study", Information Systems Research, Vol. 1 No. 3, pp. 255-76.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 26
    • 0001133137 scopus 로고    scopus 로고
    • "Coping with systems risk: Security planning models for management decision making"
    • Straub, D.W. and Welke, R.J. (1998), "Coping with systems risk: security planning models for management decision making", Management Information Systems Quarterly, Vol. 22 No. 4, pp. 441-69.
    • (1998) Management Information Systems Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 29
    • 20944446348 scopus 로고    scopus 로고
    • "The problem of common method variance in IS research"
    • Whitman, M.E. and Woszczynski, A.B. (Eds) Idea Group Publishing Whitman, M.E. Hershey, PA
    • Whitman, M.E. and Woszczynski, A.B. (2004), "The problem of common method variance in IS research", in Whitman, M.E. and Woszczynski, A.B. (Eds), The Handbook of Information Systems Research, Idea Group Publishing, Hershey, PA.
    • (2004) The Handbook of Information Systems Research
    • Whitman, M.E.1    Woszczynski, A.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.