메뉴 건너뛰기




Volumn 16, Issue 3, 2006, Pages 293-314

Value-focused assessment of information system security in organizations

Author keywords

Intensive research; IS security; Qualitative methods; Security values; Value focused thinking

Indexed keywords

INFORMATION SYSTEMS;

EID: 33744830087     PISSN: 13501917     EISSN: 13652575     Source Type: Journal    
DOI: 10.1111/j.1365-2575.2006.00219.x     Document Type: Article
Times cited : (253)

References (57)
  • 2
    • 31344472779 scopus 로고    scopus 로고
    • Signalling intentions and obliging behaviour online: An application of semiotic and legal modeling in E-commerce
    • Backhouse, J. & Cheng, E. (2000) Signalling intentions and obliging behaviour online: an application of semiotic and legal modeling in E-commerce. Journal of End User Computing, 12, 33-42.
    • (2000) Journal of End User Computing , vol.12 , pp. 33-42
    • Backhouse, J.1    Cheng, E.2
  • 4
    • 0033462687 scopus 로고    scopus 로고
    • Electronic trading and work transformation in the London Insurance Market
    • Barrett, M. & Walsham, G. (1999) Electronic trading and work transformation in the London Insurance Market. Information Systems Research, 10, 1-22.
    • (1999) Information Systems Research , vol.10 , pp. 1-22
    • Barrett, M.1    Walsham, G.2
  • 5
    • 6744247045 scopus 로고
    • Logical controls specification: An approach to information systems security
    • Klein, H.K. & Kumar, K. (eds), Elsevier Science Publishers, Amsterdam, the Netherlands
    • Baskerville, R.L. (1989) Logical controls specification: an approach to information systems security. In: Systems Development for Human Progress, Klein, H.K. & Kumar, K. (eds), pp. 241-255. Elsevier Science Publishers, Amsterdam, the Netherlands.
    • (1989) Systems Development for Human Progress , pp. 241-255
    • Baskerville, R.L.1
  • 6
    • 0013324190 scopus 로고
    • Risk analysis: An interpretive feasibility tool in justifying information systems security
    • Baskerville, R. (1991) Risk analysis: an interpretive feasibility tool in justifying information systems security. European Journal of Information Systems, 1, 121-130.
    • (1991) European Journal of Information Systems , vol.1 , pp. 121-130
    • Baskerville, R.1
  • 7
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993) Information systems security design methods: implications for information systems development. ACM Computing Surveys, 25, 375-414.
    • (1993) ACM Computing Surveys , vol.25 , pp. 375-414
    • Baskerville, R.1
  • 10
    • 0002114777 scopus 로고
    • French and British top managers' understanding of the structure and the dynamics of their industries: A cognitive analysis and comparison
    • Calori, R., Johnson, G. & Sarnin, P. (1992) French and British top managers' understanding of the structure and the dynamics of their industries: a cognitive analysis and comparison. British Journal of Management, 3, 61-92.
    • (1992) British Journal of Management , vol.3 , pp. 61-92
    • Calori, R.1    Johnson, G.2    Sarnin, P.3
  • 14
    • 0141903338 scopus 로고    scopus 로고
    • Operationalizing IT risk management
    • Coles, R.S. & Moulton, R. (2003) Operationalizing IT risk management. Computers and Security, 22, 487-493.
    • (2003) Computers and Security , vol.22 , pp. 487-493
    • Coles, R.S.1    Moulton, R.2
  • 15
    • 84973740945 scopus 로고
    • Validating a method for mapping manager's mental models of competitive industry structures
    • Daniels, K., de Chernatony, L. & Johnson, G. (1995) Validating a method for mapping manager's mental models of competitive industry structures. Human Relations, 48, 975-991.
    • (1995) Human Relations , vol.48 , pp. 975-991
    • Daniels, K.1    De Chernatony, L.2    Johnson, G.3
  • 17
    • 0035063716 scopus 로고    scopus 로고
    • Violation of safeguards by trusted personnel and understanding related information security concerns
    • Dhillon, G. (2001) Violation of safeguards by trusted personnel and understanding related information security concerns. Computers and Security, 20, 165-172.
    • (2001) Computers and Security , vol.20 , pp. 165-172
    • Dhillon, G.1
  • 18
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G. & Backhouse, J. (2001) Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal, 11, 127-153.
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 19
    • 84904253615 scopus 로고    scopus 로고
    • Interpreting computer-related crime at the Malaria Research Center: A case study
    • Eloff, J.H.P., Labuschagne, L., Solms, R.V. & Dhillon, G. (eds), Kluwer Academic Publishers, Boston, MA, USA
    • Dhillon, G. & Silva (2001) Interpreting computer-related crime at the Malaria Research Center: a case study. In: Advances in Information Security Management & Small Systems Security, Eloff, J.H.P., Labuschagne, L., Solms, R.V. & Dhillon, G. (eds), pp. 167-182. Kluwer Academic Publishers, Boston, MA, USA.
    • (2001) Advances in Information Security Management & Small Systems Security , pp. 167-182
    • Dhillon, G.1    Silva2
  • 24
    • 7744232178 scopus 로고    scopus 로고
    • A practical solution to the complex human issues of information security design
    • Katsikas, S.K. & Gritzalis, D. (eds), Chapman & Hall, London, UK
    • Hitchings, J. (1996) A practical solution to the complex human issues of information security design. In: Information Systems Security: Facing the Information Society of the 21st Century, Katsikas, S.K. & Gritzalis, D. (eds), pp. 3-12. Chapman & Hall, London, UK.
    • (1996) Information Systems Security: Facing the Information Society of the 21st Century , pp. 3-12
    • Hitchings, J.1
  • 25
    • 0348139677 scopus 로고    scopus 로고
    • The use of RepGrids to gather data about information systems analysts
    • Hunter, M.G. (1997) The use of RepGrids to gather data about information systems analysts. Information Systems Journal, 7, 67-81.
    • (1997) Information Systems Journal , vol.7 , pp. 67-81
    • Hunter, M.G.1
  • 26
    • 84904363825 scopus 로고    scopus 로고
    • Content, context, process analysis of IS security policy formulation
    • Gritzalis, D., Vimercati, S.D.C., Samarati, P. & Katsikas, S. (eds), Kluwer Academic Publishers, Boston, MA, USA
    • Karyda, M., Kokolakis, S. & Kiountouzis, E. (2003) Content, context, process analysis of IS security policy formulation. In: Security and Privacy in the Age of Uncertainty, Gritzalis, D., Vimercati, S.D.C., Samarati, P. & Katsikas, S. (eds), pp. 145-156. Kluwer Academic Publishers, Boston, MA, USA.
    • (2003) Security and Privacy in the Age of Uncertainty , pp. 145-156
    • Karyda, M.1    Kokolakis, S.2    Kiountouzis, E.3
  • 27
    • 0003721855 scopus 로고
    • Harvard University Press, Cambridge, MA, USA
    • Keeney, R.L. (1992) Value-Focused Thinking. Harvard University Press, Cambridge, MA, USA.
    • (1992) Value-focused Thinking
    • Keeney, R.L.1
  • 28
    • 0001889434 scopus 로고
    • Creativity in decision making with value-focused thinking
    • Keeney, R.L. (1994) Creativity in decision making with value-focused thinking. Sloan Management Review, 35, 33-41.
    • (1994) Sloan Management Review , vol.35 , pp. 33-41
    • Keeney, R.L.1
  • 29
    • 0032678626 scopus 로고    scopus 로고
    • The value of internet commerce to the customer
    • Keeney, R.L. (1999) The value of internet commerce to the customer. Management Science, 45, 533-542.
    • (1999) Management Science , vol.45 , pp. 533-542
    • Keeney, R.L.1
  • 31
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • Klein, H.K. & Myers, M.D. (1999) A set of principles for conducting and evaluating interpretive field studies in information systems. MIS Quarterly, 23, 67-94.
    • (1999) MIS Quarterly , vol.23 , pp. 67-94
    • Klein, H.K.1    Myers, M.D.2
  • 32
    • 0000518067 scopus 로고
    • Electronic mail as a medium for rich communication: An empirical investigation using hermeneutic interpretation
    • Lee, A.S. (1994) Electronic mail as a medium for rich communication: an empirical investigation using hermeneutic interpretation. MIS Quarterly, 18, 143-157.
    • (1994) MIS Quarterly , vol.18 , pp. 143-157
    • Lee, A.S.1
  • 33
    • 0242552856 scopus 로고    scopus 로고
    • Applying double loop learning to interpret implications for information systems security design
    • Washington DC, October 5-8
    • Mattia, A. & Dhillon, G. (2003) Applying double loop learning to interpret implications for information systems security design. IEEE Systems, Man & Cybernetics Conference, Washington DC, October 5-8.
    • (2003) IEEE Systems, Man & Cybernetics Conference
    • Mattia, A.1    Dhillon, G.2
  • 34
    • 1542493643 scopus 로고
    • CASE tools as organizational change: Investigating incremental and radical changes in systems development
    • Orlikowski, W.J. (1993) CASE tools as organizational change: investigating incremental and radical changes in systems development. MIS Quarterly, 17, 309-340.
    • (1993) MIS Quarterly , vol.17 , pp. 309-340
    • Orlikowski, W.J.1
  • 35
    • 0028409472 scopus 로고
    • Technological frames: Making sense of information technology in organisations
    • Orlikowski, W.J. & Gash, D.C. (1994) Technological frames: making sense of information technology in organisations. ACM Transactions on Information Systems, 12, 174-207.
    • (1994) ACM Transactions on Information Systems , vol.12 , pp. 174-207
    • Orlikowski, W.J.1    Gash, D.C.2
  • 36
    • 0001229464 scopus 로고
    • Information technology and structuring of organizations
    • Orlikowski, W.J. & Robey, D. (1991) Information technology and structuring of organizations. Information Systems Research, 2, 143-169.
    • (1991) Information Systems Research , vol.2 , pp. 143-169
    • Orlikowski, W.J.1    Robey, D.2
  • 37
    • 0026715302 scopus 로고
    • Developing an Expert System for tender enquiry evaluation: A case study
    • Phythian, G.J. & King, M. (1992) Developing an Expert System for tender enquiry evaluation: a case study. European Journal of Operational Research, 56, 15-29.
    • (1992) European Journal of Operational Research , vol.56 , pp. 15-29
    • Phythian, G.J.1    King, M.2
  • 38
    • 0346457562 scopus 로고    scopus 로고
    • Internet security and the case of Bank of America
    • Segev, A., Porra, J. & Roldan, M. (1998) Internet security and the case of Bank of America. Communications of the ACM, 41, 81-87.
    • (1998) Communications of the ACM , vol.41 , pp. 81-87
    • Segev, A.1    Porra, J.2    Roldan, M.3
  • 41
    • 0011644488 scopus 로고    scopus 로고
    • An analysis of the recent IS security development approaches: Descriptive and prescriptive implications
    • Dhillon, G. (ed.), Idea Group Publishing, Hershey, PA, USA
    • Siponen, M.T. (2001) An analysis of the recent IS security development approaches: descriptive and prescriptive implications. In: Information Security Management: Global Challenges in the New Millennium, Dhillon, G. (ed.), pp. 101-124. Idea Group Publishing, Hershey, PA, USA.
    • (2001) Information Security Management: Global Challenges in the New Millennium , pp. 101-124
    • Siponen, M.T.1
  • 42
    • 30744438863 scopus 로고    scopus 로고
    • An analysis of the traditional IS security approaches: Implications for research and practice
    • Siponen, M.T. (2005) An analysis of the traditional IS security approaches: implications for research and practice. European Journal of Information Systems, 14, 303-315.
    • (2005) European Journal of Information Systems , vol.14 , pp. 303-315
    • Siponen, M.T.1
  • 43
    • 0012964571 scopus 로고    scopus 로고
    • The dynamics of individual and organizational knowledge
    • Eden, C. & Spender, J.C. (eds), Sage, London, UK
    • Spender, J.C. (1998) The dynamics of individual and organizational knowledge. In: Managerial and Organizational Cognition. Eden, C. & Spender, J.C. (eds), pp. 13-39. Sage, London, UK.
    • (1998) Managerial and Organizational Cognition. , pp. 13-39
    • Spender, J.C.1
  • 44
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risks: Security planning models for management decision making
    • Straub, D.W. & Welke, R.J. (1998) Coping with systems risks: security planning models for management decision making. MIS Quarterly, 22, 441-469.
    • (1998) MIS Quarterly , vol.22 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 45
    • 0037707050 scopus 로고    scopus 로고
    • The repertory grid technique: A method for the study of cognition in information systems
    • Tan, F.B. & Hunter, M.G. (2002) The repertory grid technique: a method for the study of cognition in information systems. MIS Quarterly, 26, 39-57.
    • (2002) MIS Quarterly , vol.26 , pp. 39-57
    • Tan, F.B.1    Hunter, M.G.2
  • 46
    • 0036015964 scopus 로고    scopus 로고
    • Measuring factors that influence the success of internet commerce
    • Torkzadeh, G. & Dhillon, G. (2002) Measuring factors that influence the success of internet commerce. Information Systems Research, 13, 187-204.
    • (2002) Information Systems Research , vol.13 , pp. 187-204
    • Torkzadeh, G.1    Dhillon, G.2
  • 47
    • 0034926180 scopus 로고    scopus 로고
    • A framework for implementation of socio-ethical controls in information security
    • Trompeter, C.M. & Eloff, J.H.P. (2001) A framework for implementation of socio-ethical controls in information security. Computers and Security, 20, 384-391.
    • (2001) Computers and Security , vol.20 , pp. 384-391
    • Trompeter, C.M.1    Eloff, J.H.P.2
  • 49
    • 84974872728 scopus 로고
    • Interpretive case studies in IS research: Nature and method
    • Walsham, G. (1995) Interpretive case studies in IS research: nature and method. European Journal of Information Systems, 4, 74-81.
    • (1995) European Journal of Information Systems , vol.4 , pp. 74-81
    • Walsham, G.1
  • 50
    • 0028408489 scopus 로고
    • Information systems strategy and implementation: A case study of a building society
    • Walsham, G. & Waema, T. (1994) Information systems strategy and implementation: a case study of a building society. ACM Transactions on Information Systems, 12, 150-173.
    • (1994) ACM Transactions on Information Systems , vol.12 , pp. 150-173
    • Walsham, G.1    Waema, T.2
  • 52
    • 9744222159 scopus 로고    scopus 로고
    • Organizations as cognitive maps: Charting ways of success and failure
    • Weick, K.E. (ed.), Blackwell Publishers, Maiden, MA, USA
    • Weick, K.E. & Bougon, M.G. (2001) Organizations as cognitive maps: charting ways of success and failure. In: Making Sense of the Organization, Weick, K.E. (ed.), pp. 308-329. Blackwell Publishers, Maiden, MA, USA.
    • (2001) Making Sense of the Organization , pp. 308-329
    • Weick, K.E.1    Bougon, M.G.2
  • 53
    • 0036015966 scopus 로고    scopus 로고
    • NEBIC: A dynamic capabilities theory for assessing net-enablement
    • Wheeler, B.C. (2002) NEBIC: a dynamic capabilities theory for assessing net-enablement. Information Systems Research, 13, 125-146.
    • (2002) Information Systems Research , vol.13 , pp. 125-146
    • Wheeler, B.C.1
  • 57
    • 0040431304 scopus 로고    scopus 로고
    • Data mining for network Intrusion Detection: A comparison of alternative methods
    • Zhu, D., Premkumar, G., Zhang, X. & Chu, C. (2001) Data mining for network Intrusion Detection: a comparison of alternative methods. Decision Sciences, 32, 1-26.
    • (2001) Decision Sciences , vol.32 , pp. 1-26
    • Zhu, D.1    Premkumar, G.2    Zhang, X.3    Chu, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.