메뉴 건너뛰기




Volumn 14, Issue 3, 2006, Pages 198-217

Formulating information systems risk management strategies through cultural theory

Author keywords

Data security; Information control; National cultures; Risk management

Indexed keywords

HUMAN ENGINEERING; INFORMATION MANAGEMENT; RISK PERCEPTION; SECURITY OF DATA; SOCIAL SCIENCES;

EID: 33744805562     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220610670378     Document Type: Article
Times cited : (32)

References (53)
  • 1
    • 0040040434 scopus 로고    scopus 로고
    • Cultural theory and organizations: analytical method and cases
    • Altman, Y. and Baruch, Y. (1998), “Cultural theory and organizations: analytical method and cases”, Organization Studies, Vol. 19 No. 5, pp. 769-85.
    • (1998) Organization Studies , vol.19 , Issue.5 , pp. 769-785
    • Altman, Y.1    Baruch, Y.2
  • 2
    • 0013324190 scopus 로고
    • Risk analysis: an interpretive feasibility tool in justifying information systems security
    • Baskerville, R. (1991), “Risk analysis: an interpretive feasibility tool in justifying information systems security”, European Journal of Information Systems, Vol. 1 No. 2, pp. 121-30.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 3
    • 0023440165 scopus 로고
    • Organizations and systematic distortion of information
    • Bella, D. (1987), “Organizations and systematic distortion of information”, Journal of Professional Issues in Engineering, Vol. 113 No. 4, pp. 360-70.
    • (1987) Journal of Professional Issues in Engineering , vol.113 , Issue.4 , pp. 360-370
    • Bella, D.1
  • 4
    • 84937280399 scopus 로고    scopus 로고
    • Risk perception and social anthropology: a critique of cultural theory
    • Boholm, A. (1996), “Risk perception and social anthropology: a critique of cultural theory”, Ethnos, Vol. 61 Nos 1 / 2, pp. 64-84.
    • (1996) Ethnos , vol.61 , Issue.1-2 , pp. 64-84
    • Boholm, A.1
  • 5
  • 6
    • 0043219327 scopus 로고
    • Information security awareness raising methods
    • Cresson Wood, C. (1995), “Information security awareness raising methods”, Computer Fraud & Security Bulletin, Vol. 1995 No. 6, pp. 13-15.
    • (1995) Computer Fraud & Security Bulletin , vol.1995 , Issue.6 , pp. 13-15
    • Cresson Wood, C.1
  • 7
    • 33744787989 scopus 로고    scopus 로고
    • Policies alone do not constitute a sufficient awareness effort
    • Cresson Wood, C. (1997), “Policies alone do not constitute a sufficient awareness effort”, Computer Fraud & Security, Vol. 1997 No. 12, p. 14.
    • (1997) Computer Fraud & Security , vol.1997 , Issue.12 , pp. 14
    • Cresson Wood, C.1
  • 8
    • 84935508209 scopus 로고
    • Orienting dispositions in the perception of risk: an analysis of contemporary worldviews and cultural biases
    • Dake, K. (1991), “Orienting dispositions in the perception of risk: an analysis of contemporary worldviews and cultural biases”, Journal of Cross-cultural Psychology, Vol. 22 No. 1, pp. 61-82.
    • (1991) Journal of Cross-cultural Psychology , vol.22 , Issue.1 , pp. 61-82
    • Dake, K.1
  • 9
    • 84979347194 scopus 로고
    • Myths of nature: culture and the social construction of risk
    • Dake, K. (1992), “Myths of nature: culture and the social construction of risk”, Journal of Social Issues, Vol. 48 No. 4, pp. 21-37.
    • (1992) Journal of Social Issues , vol.48 , Issue.4 , pp. 21-37
    • Dake, K.1
  • 11
    • 0000622779 scopus 로고    scopus 로고
    • Hazards and risk perception among young novice drivers
    • Deery, H. (1999), “Hazards and risk perception among young novice drivers”, Journal of Safety Research, Vol. 30 No. 4, pp. 225-36.
    • (1999) Journal of Safety Research , vol.30 , Issue.4 , pp. 225-236
    • Deery, H.1
  • 12
    • 84992969120 scopus 로고    scopus 로고
    • DFS
    • Swedish Information Processing Society available at: (accessed 27 September 2005).
    • DFS (2005), SBA Security: SBA-Scenario, Swedish Information Processing Society, available at: www.dfs.se/products/sbaeng/method/ (accessed 27 September 2005).
    • (2005) SBA Security: SBA-Scenario
  • 13
    • 0004101237 scopus 로고
    • Cultural bias
    • Occasional Paper No. 35, Royal Anthropological Institute of Great Britain and Ireland.
    • Douglas, M. (1978), “Cultural bias”, Occasional Paper No. 35, Royal Anthropological Institute of Great Britain and Ireland.
    • (1978)
    • Douglas, M.1
  • 16
    • 12344271092 scopus 로고    scopus 로고
    • Psychosocial and cultural factors affecting the perceived risk of genetically modified food: an overview of the literature
    • Finucane, M. and Holup, J. (2005), “Psychosocial and cultural factors affecting the perceived risk of genetically modified food: an overview of the literature”, Social Science & Medicine, Vol. 60, pp. 1603-12.
    • (2005) Social Science & Medicine , vol.60 , pp. 1603-1612
    • Finucane, M.1    Holup, J.2
  • 17
    • 0346481810 scopus 로고    scopus 로고
    • The techniques of risk analysis are insufficient in themselves
    • Frosdick, S. (1997), “The techniques of risk analysis are insufficient in themselves”, Disaster Prevention and Management, Vol. 6 No. 3, pp. 165-77.
    • (1997) Disaster Prevention and Management , vol.6 , Issue.3 , pp. 165-177
    • Frosdick, S.1
  • 18
    • 15744404682 scopus 로고    scopus 로고
    • Management of risk in the information age
    • Gerber, M. and von Solms, R. (2005), “Management of risk in the information age”, Computers and Security, Vol. 24 No. 1, pp. 16-30.
    • (2005) Computers and Security , vol.24 , Issue.1 , pp. 16-30
    • Gerber, M.1    von Solms, R.2
  • 19
    • 0003551116 scopus 로고
    • Columbia University Press New York, NY
    • Gross, J. and Rayner, S. (1985), Measuring Culture, Columbia University Press, New York, NY.
    • (1985) Measuring Culture
    • Gross, J.1    Rayner, S.2
  • 20
    • 85003712015 scopus 로고    scopus 로고
    • Designing a security awareness program: part I
    • Hansche, S. (2001), “Designing a security awareness program: part I”, Information Systems Security, Vol. 9 No. 6, pp. 14-22.
    • (2001) Information Systems Security , vol.9 , Issue.6 , pp. 14-22
    • Hansche, S.1
  • 21
    • 84992930734 scopus 로고    scopus 로고
    • Institute of Risk Management
    • AIRMIC, ALARM, IRM available at: (accessed 4 October 2005).
    • Institute of Risk Management (2002), A Risk Management Standard, AIRMIC, ALARM, IRM,, available at: www.theirm.org/ (accessed 4 October 2005).
    • (2002) A Risk Management Standard
  • 25
    • 18844431067 scopus 로고    scopus 로고
    • Information systems security: a contextual perspective
    • Karyda, M., Kiountouzis, E. and Kokolakis, S. (2005), “Information systems security: a contextual perspective”, Computers and Security Journal, Vol. 24 No. 3, pp. 246-60.
    • (2005) Computers and Security Journal , vol.24 , Issue.3 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 26
    • 0002584503 scopus 로고
    • The social amplification of risk: progress in developing an integrative framework
    • Chapter 6. Praeger London
    • Kasperson, R. (1992), “The social amplification of risk: progress in developing an integrative framework”, in Ed. Krimsky, S. and Ed. Golding, D. (Eds), Social Theories of Risk, Chapter 6.Vol. 6, Praeger, London, pp. 153-78.
    • (1992) Social Theories of Risk , vol.6 , pp. 153-178
    • Kasperson, R.1    Krimsky, S.2    Golding, D.3
  • 27
    • 0033653492 scopus 로고    scopus 로고
    • Public perceptions of health risks from polluted coastal bathing waters: a mixed methodological analysis using cultural theory
    • Langford, I., Georgiou, S., Bateman, I., Day, R. and Turner, R. (2000), “Public perceptions of health risks from polluted coastal bathing waters: a mixed methodological analysis using cultural theory”, Risk Analysis: An International Journal, Vol. 20 No. 5, pp. 691-705.
    • (2000) Risk Analysis: An International Journal , vol.20 , Issue.5 , pp. 691-705
    • Langford, I.1    Georgiou, S.2    Bateman, I.3    Day, R.4    Turner, R.5
  • 28
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • Leach, J. (2003), “Improving user security behaviour”, Computers and Security, Vol. 22 No. 8, pp. 685-92.
    • (2003) Computers and Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 29
    • 17644368561 scopus 로고    scopus 로고
    • Cultural theory meets the community: worldviews and local issues
    • Lima, M. and Castro, P. (2005), “Cultural theory meets the community: worldviews and local issues”, Journal of Environmental Psychology, Vol. 25 No. 1, pp. 23-35.
    • (2005) Journal of Environmental Psychology , vol.25 , Issue.1 , pp. 23-35
    • Lima, M.1    Castro, P.2
  • 30
    • 0030418298 scopus 로고    scopus 로고
    • Integrating sociological and psychological approaches to public perceptions of environmental risks: detailed results from a questionnaire survey
    • Centre for Social and Economic Research on the Global Environment, University of East Anglia Norwich
    • Marris, C., Langford, I. and O'Riordan, T. (1996U), “Integrating sociological and psychological approaches to public perceptions of environmental risks: detailed results from a questionnaire survey”, Centre for Social and Economic Research on the Global Environment, University of East Anglia, Norwich.
    • (1996)
    • Marris, C.1    Langford, I.2    O'Riordan, T.3
  • 31
    • 84986145328 scopus 로고    scopus 로고
    • Human factor failure and the comparative structure of jobs: the implications for risk management
    • Mars, G. (1996), “Human factor failure and the comparative structure of jobs: the implications for risk management”, Journal of Managerial Psychology, Vol. 11 No. 3, pp. 4-11.
    • (1996) Journal of Managerial Psychology , vol.11 , Issue.3 , pp. 4-11
    • Mars, G.1
  • 32
    • 0033400515 scopus 로고    scopus 로고
    • Cultural theory as theory of democracy
    • Ney, S. and Molenaars, N. (1999), “Cultural theory as theory of democracy”, Innovation, Vol. 12 No. 4.
    • (1999) Innovation , vol.12 , Issue.4
    • Ney, S.1    Molenaars, N.2
  • 34
    • 84993099250 scopus 로고    scopus 로고
    • Implementing an information security awareness program
    • Peltier, T. (2005), “Implementing an information security awareness program”, Information Systems Security, Vol. 14 No. 2, pp. 12-37.
    • (2005) Information Systems Security , vol.14 , Issue.2 , pp. 12-37
    • Peltier, T.1
  • 35
    • 0034271735 scopus 로고    scopus 로고
    • Risky business: what we have yet to learn about risk management
    • Pfleeger, S. (2000), “Risky business: what we have yet to learn about risk management”, Journal of Systems Software, Vol. 53, pp. 265-73.
    • (2000) Journal of Systems Software , vol.53 , pp. 265-273
    • Pfleeger, S.1
  • 36
    • 0003328807 scopus 로고
    • Disagreeing about risk: the institutional cultures of risk management and planning for future generations
    • Associated Faculty Press New York, NY
    • Rayner, S. (1984), “Disagreeing about risk: the institutional cultures of risk management and planning for future generations”, in Ed. Halden, S. (Ed.), Risk Analysis, Institutions, and Public Policy, Associated Faculty Press, New York, NY, pp. 150-69.
    • (1984) Risk Analysis, Institutions, and Public Policy , pp. 150-169
    • Rayner, S.1    Halden, S.2
  • 37
    • 84972700626 scopus 로고
    • Management of radiation hazards in hospitals: plural rationalities in a single institution
    • Rayner, S. (1986), “Management of radiation hazards in hospitals: plural rationalities in a single institution”, Social Studies of Science, Vol. 16, pp. 573-91.
    • (1986) Social Studies of Science , vol.16 , pp. 573-591
    • Rayner, S.1
  • 38
    • 0001875917 scopus 로고
    • Cultural theory and risk analysis
    • Praeger Westport, CT
    • Rayner, S. (1992), “Cultural theory and risk analysis”, in Ed. Krimsky, S. and Ed. Golding, D. (Eds), Social Theories of Risk, Praeger, Westport, CT, pp. 83-116.
    • (1992) Social Theories of Risk , pp. 83-116
    • Rayner, S.1    Krimsky, S.2    Golding, D.3
  • 39
    • 0023306359 scopus 로고
    • How fair is safe enough? The cultural approach to societal technology choice
    • Rayner, S. and Cantor, R. (1987), “How fair is safe enough? The cultural approach to societal technology choice”, Risk Analysis, Vol. 7, pp. 3-10.
    • (1987) Risk Analysis , vol.7 , pp. 3-10
    • Rayner, S.1    Cantor, R.2
  • 40
    • 84921972551 scopus 로고    scopus 로고
    • Cultural theory and risk perception: a proposal for a better measurement
    • Rippl, S. (2002), “Cultural theory and risk perception: a proposal for a better measurement”, Journal of Risk Research, Vol. 5 No. 2, pp. 147-65.
    • (2002) Journal of Risk Research , vol.5 , Issue.2 , pp. 147-165
    • Rippl, S.1
  • 41
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 42
    • 0000447923 scopus 로고    scopus 로고
    • Explaining risk perception: an empirical evaluation of cultural theory
    • Sjöberg, L. (1997), “Explaining risk perception: an empirical evaluation of cultural theory”, Risk, Decision and Policy, Vol. 2 No. 2, pp. 113-30.
    • (1997) Risk, Decision and Policy , vol.2 , Issue.2 , pp. 113-130
    • Sjöberg, L.1
  • 43
    • 0000448112 scopus 로고    scopus 로고
    • World views, political attitudes and risk perception
    • Sjöberg, L. (1998), “World views, political attitudes and risk perception”, Risk: Health, Safety and Environment, Vol. 9 No. 2, pp. 137-52.
    • (1998) Risk: Health, Safety and Environment , vol.9 , Issue.2 , pp. 137-152
    • Sjöberg, L.1
  • 44
    • 0342322905 scopus 로고    scopus 로고
    • Factors in risk perception
    • Sjoberg, L. (2000), “Factors in risk perception”, Risk Analysis, Vol. 20 No. 1.
    • (2000) Risk Analysis , vol.20 , Issue.1
    • Sjoberg, L.1
  • 46
    • 77950032652 scopus 로고    scopus 로고
    • Communication and cultural distortion during crises
    • Smallman, C. and Weir, D. (1999), “Communication and cultural distortion during crises”, Disaster Prevention and Mangement, Vol. 8 No. 1, pp. 33-41.
    • (1999) Disaster Prevention and Mangement , vol.8 , Issue.1 , pp. 33-41
    • Smallman, C.1    Weir, D.2
  • 47
    • 0002040996 scopus 로고    scopus 로고
    • Cultural theory and risk: a review
    • Tansey, J. and O'Riordan, T. (1999), “Cultural theory and risk: a review”, Health Risk Society, Vol. 1 No. 1.
    • (1999) Health Risk Society , vol.1 , Issue.1
    • Tansey, J.1    O'Riordan, T.2
  • 49
    • 33744805501 scopus 로고    scopus 로고
    • Explaining risk perception: an evaluation of cultural theory, Norwegian university of science and technology
    • Norwegian University of Science and Technology, Department of Psychology Trondheim
    • Torbjorn, R. (2004), “Explaining risk perception: an evaluation of cultural theory, Norwegian university of science and technology”, Vol. 85, Norwegian University of Science and Technology, Department of Psychology, Trondheim.
    • (2004) , vol.85
    • Torbjorn, R.1
  • 50
    • 0034926180 scopus 로고    scopus 로고
    • A framework for the implementation of socio-ethical controls in information security
    • Trompeter, C. and Eloff, J. (2001), “A framework for the implementation of socio-ethical controls in information security”, Computers and Security, Vol. 20 No. 5, pp. 384-91.
    • (2001) Computers and Security , vol.20 , Issue.5 , pp. 384-391
    • Trompeter, C.1    Eloff, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.