-
1
-
-
0040040434
-
Cultural theory and organizations: analytical method and cases
-
Altman, Y. and Baruch, Y. (1998), “Cultural theory and organizations: analytical method and cases”, Organization Studies, Vol. 19 No. 5, pp. 769-85.
-
(1998)
Organization Studies
, vol.19
, Issue.5
, pp. 769-785
-
-
Altman, Y.1
Baruch, Y.2
-
2
-
-
0013324190
-
Risk analysis: an interpretive feasibility tool in justifying information systems security
-
Baskerville, R. (1991), “Risk analysis: an interpretive feasibility tool in justifying information systems security”, European Journal of Information Systems, Vol. 1 No. 2, pp. 121-30.
-
(1991)
European Journal of Information Systems
, vol.1
, Issue.2
, pp. 121-130
-
-
Baskerville, R.1
-
3
-
-
0023440165
-
Organizations and systematic distortion of information
-
Bella, D. (1987), “Organizations and systematic distortion of information”, Journal of Professional Issues in Engineering, Vol. 113 No. 4, pp. 360-70.
-
(1987)
Journal of Professional Issues in Engineering
, vol.113
, Issue.4
, pp. 360-370
-
-
Bella, D.1
-
4
-
-
84937280399
-
Risk perception and social anthropology: a critique of cultural theory
-
Boholm, A. (1996), “Risk perception and social anthropology: a critique of cultural theory”, Ethnos, Vol. 61 Nos 1 / 2, pp. 64-84.
-
(1996)
Ethnos
, vol.61
, Issue.1-2
, pp. 64-84
-
-
Boholm, A.1
-
5
-
-
84993018975
-
Computer Security Institute
-
CSI Inc. Miamai, OK
-
Computer Security Institute (2005), CSI/FBI Computer Crime and Security Survey, CSI Inc., Miamai, OK.
-
(2005)
CSI/FBI Computer Crime and Security Survey
-
-
-
6
-
-
0043219327
-
Information security awareness raising methods
-
Cresson Wood, C. (1995), “Information security awareness raising methods”, Computer Fraud & Security Bulletin, Vol. 1995 No. 6, pp. 13-15.
-
(1995)
Computer Fraud & Security Bulletin
, vol.1995
, Issue.6
, pp. 13-15
-
-
Cresson Wood, C.1
-
7
-
-
33744787989
-
Policies alone do not constitute a sufficient awareness effort
-
Cresson Wood, C. (1997), “Policies alone do not constitute a sufficient awareness effort”, Computer Fraud & Security, Vol. 1997 No. 12, p. 14.
-
(1997)
Computer Fraud & Security
, vol.1997
, Issue.12
, pp. 14
-
-
Cresson Wood, C.1
-
8
-
-
84935508209
-
Orienting dispositions in the perception of risk: an analysis of contemporary worldviews and cultural biases
-
Dake, K. (1991), “Orienting dispositions in the perception of risk: an analysis of contemporary worldviews and cultural biases”, Journal of Cross-cultural Psychology, Vol. 22 No. 1, pp. 61-82.
-
(1991)
Journal of Cross-cultural Psychology
, vol.22
, Issue.1
, pp. 61-82
-
-
Dake, K.1
-
9
-
-
84979347194
-
Myths of nature: culture and the social construction of risk
-
Dake, K. (1992), “Myths of nature: culture and the social construction of risk”, Journal of Social Issues, Vol. 48 No. 4, pp. 21-37.
-
(1992)
Journal of Social Issues
, vol.48
, Issue.4
, pp. 21-37
-
-
Dake, K.1
-
10
-
-
0001792340
-
Individual differences in risk perception and risk-taking preferences
-
Plenum Press New York, NY
-
Dake, K. and Wildavsky, A. (1991), “Individual differences in risk perception and risk-taking preferences”, in Ed. Garrick, B.J. and Ed. Gekler, W.C. (Eds), The Analysis, Communication, and Perception of Risk, Plenum Press, New York, NY, pp. 15-24.
-
(1991)
The Analysis, Communication, and Perception of Risk
, pp. 15-24
-
-
Dake, K.1
Wildavsky, A.2
Garrick, B.J.3
Gekler, W.C.4
-
11
-
-
0000622779
-
Hazards and risk perception among young novice drivers
-
Deery, H. (1999), “Hazards and risk perception among young novice drivers”, Journal of Safety Research, Vol. 30 No. 4, pp. 225-36.
-
(1999)
Journal of Safety Research
, vol.30
, Issue.4
, pp. 225-236
-
-
Deery, H.1
-
12
-
-
84992969120
-
DFS
-
Swedish Information Processing Society available at: (accessed 27 September 2005).
-
DFS (2005), SBA Security: SBA-Scenario, Swedish Information Processing Society, available at: www.dfs.se/products/sbaeng/method/ (accessed 27 September 2005).
-
(2005)
SBA Security: SBA-Scenario
-
-
-
13
-
-
0004101237
-
Cultural bias
-
Occasional Paper No. 35, Royal Anthropological Institute of Great Britain and Ireland.
-
Douglas, M. (1978), “Cultural bias”, Occasional Paper No. 35, Royal Anthropological Institute of Great Britain and Ireland.
-
(1978)
-
-
Douglas, M.1
-
16
-
-
12344271092
-
Psychosocial and cultural factors affecting the perceived risk of genetically modified food: an overview of the literature
-
Finucane, M. and Holup, J. (2005), “Psychosocial and cultural factors affecting the perceived risk of genetically modified food: an overview of the literature”, Social Science & Medicine, Vol. 60, pp. 1603-12.
-
(2005)
Social Science & Medicine
, vol.60
, pp. 1603-1612
-
-
Finucane, M.1
Holup, J.2
-
17
-
-
0346481810
-
The techniques of risk analysis are insufficient in themselves
-
Frosdick, S. (1997), “The techniques of risk analysis are insufficient in themselves”, Disaster Prevention and Management, Vol. 6 No. 3, pp. 165-77.
-
(1997)
Disaster Prevention and Management
, vol.6
, Issue.3
, pp. 165-177
-
-
Frosdick, S.1
-
18
-
-
15744404682
-
Management of risk in the information age
-
Gerber, M. and von Solms, R. (2005), “Management of risk in the information age”, Computers and Security, Vol. 24 No. 1, pp. 16-30.
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 16-30
-
-
Gerber, M.1
von Solms, R.2
-
19
-
-
0003551116
-
-
Columbia University Press New York, NY
-
Gross, J. and Rayner, S. (1985), Measuring Culture, Columbia University Press, New York, NY.
-
(1985)
Measuring Culture
-
-
Gross, J.1
Rayner, S.2
-
20
-
-
85003712015
-
Designing a security awareness program: part I
-
Hansche, S. (2001), “Designing a security awareness program: part I”, Information Systems Security, Vol. 9 No. 6, pp. 14-22.
-
(2001)
Information Systems Security
, vol.9
, Issue.6
, pp. 14-22
-
-
Hansche, S.1
-
21
-
-
84992930734
-
Institute of Risk Management
-
AIRMIC, ALARM, IRM available at: (accessed 4 October 2005).
-
Institute of Risk Management (2002), A Risk Management Standard, AIRMIC, ALARM, IRM,, available at: www.theirm.org/ (accessed 4 October 2005).
-
(2002)
A Risk Management Standard
-
-
-
24
-
-
33744787211
-
Information systems security and the structuring of organisations
-
Karyda, M., Kokolakis, S. and Kiountouzis, E. (2004), “Information systems security and the structuring of organisations”, Proceedings of the 7th International Conference on the Social and Ethical Impacts of Information and Communication Technologies (ETHICOMP 2004), Syros, Greece, pp. 451-61.
-
(2004)
Proceedings of the 7th International Conference on the Social and Ethical Impacts of Information and Communication Technologies (ETHICOMP 2004), Syros, Greece
, pp. 451-461
-
-
Karyda, M.1
Kokolakis, S.2
Kiountouzis, E.3
-
25
-
-
18844431067
-
Information systems security: a contextual perspective
-
Karyda, M., Kiountouzis, E. and Kokolakis, S. (2005), “Information systems security: a contextual perspective”, Computers and Security Journal, Vol. 24 No. 3, pp. 246-60.
-
(2005)
Computers and Security Journal
, vol.24
, Issue.3
, pp. 246-260
-
-
Karyda, M.1
Kiountouzis, E.2
Kokolakis, S.3
-
26
-
-
0002584503
-
The social amplification of risk: progress in developing an integrative framework
-
Chapter 6. Praeger London
-
Kasperson, R. (1992), “The social amplification of risk: progress in developing an integrative framework”, in Ed. Krimsky, S. and Ed. Golding, D. (Eds), Social Theories of Risk, Chapter 6.Vol. 6, Praeger, London, pp. 153-78.
-
(1992)
Social Theories of Risk
, vol.6
, pp. 153-178
-
-
Kasperson, R.1
Krimsky, S.2
Golding, D.3
-
27
-
-
0033653492
-
Public perceptions of health risks from polluted coastal bathing waters: a mixed methodological analysis using cultural theory
-
Langford, I., Georgiou, S., Bateman, I., Day, R. and Turner, R. (2000), “Public perceptions of health risks from polluted coastal bathing waters: a mixed methodological analysis using cultural theory”, Risk Analysis: An International Journal, Vol. 20 No. 5, pp. 691-705.
-
(2000)
Risk Analysis: An International Journal
, vol.20
, Issue.5
, pp. 691-705
-
-
Langford, I.1
Georgiou, S.2
Bateman, I.3
Day, R.4
Turner, R.5
-
28
-
-
0345764837
-
Improving user security behaviour
-
Leach, J. (2003), “Improving user security behaviour”, Computers and Security, Vol. 22 No. 8, pp. 685-92.
-
(2003)
Computers and Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
29
-
-
17644368561
-
Cultural theory meets the community: worldviews and local issues
-
Lima, M. and Castro, P. (2005), “Cultural theory meets the community: worldviews and local issues”, Journal of Environmental Psychology, Vol. 25 No. 1, pp. 23-35.
-
(2005)
Journal of Environmental Psychology
, vol.25
, Issue.1
, pp. 23-35
-
-
Lima, M.1
Castro, P.2
-
30
-
-
0030418298
-
Integrating sociological and psychological approaches to public perceptions of environmental risks: detailed results from a questionnaire survey
-
Centre for Social and Economic Research on the Global Environment, University of East Anglia Norwich
-
Marris, C., Langford, I. and O'Riordan, T. (1996U), “Integrating sociological and psychological approaches to public perceptions of environmental risks: detailed results from a questionnaire survey”, Centre for Social and Economic Research on the Global Environment, University of East Anglia, Norwich.
-
(1996)
-
-
Marris, C.1
Langford, I.2
O'Riordan, T.3
-
31
-
-
84986145328
-
Human factor failure and the comparative structure of jobs: the implications for risk management
-
Mars, G. (1996), “Human factor failure and the comparative structure of jobs: the implications for risk management”, Journal of Managerial Psychology, Vol. 11 No. 3, pp. 4-11.
-
(1996)
Journal of Managerial Psychology
, vol.11
, Issue.3
, pp. 4-11
-
-
Mars, G.1
-
32
-
-
0033400515
-
Cultural theory as theory of democracy
-
Ney, S. and Molenaars, N. (1999), “Cultural theory as theory of democracy”, Innovation, Vol. 12 No. 4.
-
(1999)
Innovation
, vol.12
, Issue.4
-
-
Ney, S.1
Molenaars, N.2
-
34
-
-
84993099250
-
Implementing an information security awareness program
-
Peltier, T. (2005), “Implementing an information security awareness program”, Information Systems Security, Vol. 14 No. 2, pp. 12-37.
-
(2005)
Information Systems Security
, vol.14
, Issue.2
, pp. 12-37
-
-
Peltier, T.1
-
35
-
-
0034271735
-
Risky business: what we have yet to learn about risk management
-
Pfleeger, S. (2000), “Risky business: what we have yet to learn about risk management”, Journal of Systems Software, Vol. 53, pp. 265-73.
-
(2000)
Journal of Systems Software
, vol.53
, pp. 265-273
-
-
Pfleeger, S.1
-
36
-
-
0003328807
-
Disagreeing about risk: the institutional cultures of risk management and planning for future generations
-
Associated Faculty Press New York, NY
-
Rayner, S. (1984), “Disagreeing about risk: the institutional cultures of risk management and planning for future generations”, in Ed. Halden, S. (Ed.), Risk Analysis, Institutions, and Public Policy, Associated Faculty Press, New York, NY, pp. 150-69.
-
(1984)
Risk Analysis, Institutions, and Public Policy
, pp. 150-169
-
-
Rayner, S.1
Halden, S.2
-
37
-
-
84972700626
-
Management of radiation hazards in hospitals: plural rationalities in a single institution
-
Rayner, S. (1986), “Management of radiation hazards in hospitals: plural rationalities in a single institution”, Social Studies of Science, Vol. 16, pp. 573-91.
-
(1986)
Social Studies of Science
, vol.16
, pp. 573-591
-
-
Rayner, S.1
-
38
-
-
0001875917
-
Cultural theory and risk analysis
-
Praeger Westport, CT
-
Rayner, S. (1992), “Cultural theory and risk analysis”, in Ed. Krimsky, S. and Ed. Golding, D. (Eds), Social Theories of Risk, Praeger, Westport, CT, pp. 83-116.
-
(1992)
Social Theories of Risk
, pp. 83-116
-
-
Rayner, S.1
Krimsky, S.2
Golding, D.3
-
39
-
-
0023306359
-
How fair is safe enough? The cultural approach to societal technology choice
-
Rayner, S. and Cantor, R. (1987), “How fair is safe enough? The cultural approach to societal technology choice”, Risk Analysis, Vol. 7, pp. 3-10.
-
(1987)
Risk Analysis
, vol.7
, pp. 3-10
-
-
Rayner, S.1
Cantor, R.2
-
40
-
-
84921972551
-
Cultural theory and risk perception: a proposal for a better measurement
-
Rippl, S. (2002), “Cultural theory and risk perception: a proposal for a better measurement”, Journal of Risk Research, Vol. 5 No. 2, pp. 147-65.
-
(2002)
Journal of Risk Research
, vol.5
, Issue.2
, pp. 147-165
-
-
Rippl, S.1
-
41
-
-
0033683516
-
A conceptual foundation for organizational information security awareness
-
Siponen, M. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.1
-
42
-
-
0000447923
-
Explaining risk perception: an empirical evaluation of cultural theory
-
Sjöberg, L. (1997), “Explaining risk perception: an empirical evaluation of cultural theory”, Risk, Decision and Policy, Vol. 2 No. 2, pp. 113-30.
-
(1997)
Risk, Decision and Policy
, vol.2
, Issue.2
, pp. 113-130
-
-
Sjöberg, L.1
-
43
-
-
0000448112
-
World views, political attitudes and risk perception
-
Sjöberg, L. (1998), “World views, political attitudes and risk perception”, Risk: Health, Safety and Environment, Vol. 9 No. 2, pp. 137-52.
-
(1998)
Risk: Health, Safety and Environment
, vol.9
, Issue.2
, pp. 137-152
-
-
Sjöberg, L.1
-
44
-
-
0342322905
-
Factors in risk perception
-
Sjoberg, L. (2000), “Factors in risk perception”, Risk Analysis, Vol. 20 No. 1.
-
(2000)
Risk Analysis
, vol.20
, Issue.1
-
-
Sjoberg, L.1
-
45
-
-
0002795580
-
Facts and fears: understanding perceived risk
-
Plenum London
-
Slovic, P., Fischoff, B. and Lichtenstein, S. (1980), “Facts and fears: understanding perceived risk”, in Ed. Schwing, R.C. and Ed. Albers, W.A. (Eds), Societal Risk Assessment. How Safe is Safe Enough?, Plenum, London, pp. 181-216.
-
(1980)
Societal Risk Assessment. How Safe is Safe Enough?
, pp. 181-216
-
-
Slovic, P.1
Fischoff, B.2
Lichtenstein, S.3
Schwing, R.C.4
Albers, W.A.5
-
46
-
-
77950032652
-
Communication and cultural distortion during crises
-
Smallman, C. and Weir, D. (1999), “Communication and cultural distortion during crises”, Disaster Prevention and Mangement, Vol. 8 No. 1, pp. 33-41.
-
(1999)
Disaster Prevention and Mangement
, vol.8
, Issue.1
, pp. 33-41
-
-
Smallman, C.1
Weir, D.2
-
47
-
-
0002040996
-
Cultural theory and risk: a review
-
Tansey, J. and O'Riordan, T. (1999), “Cultural theory and risk: a review”, Health Risk Society, Vol. 1 No. 1.
-
(1999)
Health Risk Society
, vol.1
, Issue.1
-
-
Tansey, J.1
O'Riordan, T.2
-
48
-
-
84872767676
-
-
Westview Press Boulder, CO
-
Thompson, M., Richard, E. and Wildavsky, A. (1990), Cultural Theory, Westview Press, Boulder, CO.
-
(1990)
Cultural Theory
-
-
Thompson, M.1
Richard, E.2
Wildavsky, A.3
-
49
-
-
33744805501
-
Explaining risk perception: an evaluation of cultural theory, Norwegian university of science and technology
-
Norwegian University of Science and Technology, Department of Psychology Trondheim
-
Torbjorn, R. (2004), “Explaining risk perception: an evaluation of cultural theory, Norwegian university of science and technology”, Vol. 85, Norwegian University of Science and Technology, Department of Psychology, Trondheim.
-
(2004)
, vol.85
-
-
Torbjorn, R.1
-
50
-
-
0034926180
-
A framework for the implementation of socio-ethical controls in information security
-
Trompeter, C. and Eloff, J. (2001), “A framework for the implementation of socio-ethical controls in information security”, Computers and Security, Vol. 20 No. 5, pp. 384-91.
-
(2001)
Computers and Security
, vol.20
, Issue.5
, pp. 384-391
-
-
Trompeter, C.1
Eloff, J.2
-
52
-
-
18844366037
-
information systems security and the need for policy
-
Idea Group Publishing Harshey, PA
-
Whitman, M., Towsend, A. and Aalberts, R. (2001), “information systems security and the need for policy”, in Ed. Dhillon, G. (Ed.), Information Security Management: Global Challenges in the New Millennium, Idea Group Publishing, Harshey, PA.
-
(2001)
Information Security Management: Global Challenges in the New Millennium
-
-
Whitman, M.1
Towsend, A.2
Aalberts, R.3
Dhillon, G.4
|