메뉴 건너뛰기




Volumn 14, Issue 4, 2006, Pages 343-360

On security preparations against possible is threats across industries

Author keywords

Data security; Information systems

Indexed keywords

DEVELOPING COUNTRIES; INFORMATION MANAGEMENT; MANAGEMENT INFORMATION SYSTEMS;

EID: 33746622997     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220610690817     Document Type: Article
Times cited : (26)

References (39)
  • 6
    • 84993043242 scopus 로고    scopus 로고
    • "The Ernst & Young international information security survey 1995"
    • Ernst & Young (1996), "The Ernst & Young international information security survey 1995", Information Management & Computer Security, Vol. 4 No. 4, pp. 26-33.
    • (1996) Information Management & Computer Security , vol.4 , Issue.4 , pp. 26-33
    • Ernst1    Young2
  • 9
    • 0042363355 scopus 로고    scopus 로고
    • "The application of information security policies in large UK-based organizations: An exploratory investigation"
    • Fulford, H. and Doherty, N.F. (2003), "The application of information security policies in large UK-based organizations: An exploratory investigation", Information Management & Computer Security, Vol. 11 No. 3, pp. 106-14.
    • (2003) Information Management & Computer Security , vol.11 , Issue.3 , pp. 106-114
    • Fulford, H.1    Doherty, N.F.2
  • 10
    • 4243121902 scopus 로고    scopus 로고
    • "A framework for using insurance for cyber risk management"
    • Gordon, L.A., Gordon, M.P.L. and Sohail, T. (2003), "A framework for using insurance for cyber risk management", Communciations of the ACM, March, pp. 81-5.
    • (2003) Communciations of the ACM , pp. 81-85
    • Gordon, L.A.1    Gordon, M.P.L.2    Sohail, T.3
  • 11
    • 0001823869 scopus 로고
    • "Security concerns of system users: A study of perceptions of the adequacy of security"
    • Goodhue, D.L. and Straub, D.W. (1991), "Security concerns of system users: A study of perceptions of the adequacy of security", Information & Management, Vol. 20, pp. 13-22.
    • (1991) Information & Management , vol.20 , pp. 13-22
    • Goodhue, D.L.1    Straub, D.W.2
  • 12
    • 24144453387 scopus 로고    scopus 로고
    • "Information systems security issues and decisions for small business"
    • Gupta, A. and Hammond, R. (2005), "Information systems security issues and decisions for small business", Information Management & Computer Security, Vol. 13 No. 4, pp. 297-310.
    • (2005) Information Management & Computer Security , vol.13 , Issue.4 , pp. 297-310
    • Gupta, A.1    Hammond, R.2
  • 13
    • 0037228072 scopus 로고    scopus 로고
    • "The law, cybercrime, risk assessment and cyber protection"
    • Hinde, S. (2003), "The law, cybercrime, risk assessment and cyber protection", Computers and Security, Vol. 22 No. 2, pp. 90-5.
    • (2003) Computers and Security , vol.22 , Issue.2 , pp. 90-95
    • Hinde, S.1
  • 15
    • 0001366346 scopus 로고
    • "Information technology and corporate strategy: A view from the top"
    • Jarvenpaa, S.L. and Ives, B. (1990), "Information technology and corporate strategy: A view from the top", Information Systems Research, Vol. 1 No. 4, pp. 351-75.
    • (1990) Information Systems Research , vol.1 , Issue.4 , pp. 351-375
    • Jarvenpaa, S.L.1    Ives, B.2
  • 16
    • 0035479209 scopus 로고    scopus 로고
    • "Securtity threats to internet: A Korean multi-industry investigation"
    • Jung, B., Han, I. and Lee, S. (2001), "Securtity threats to internet: A Korean multi-industry investigation", Information & Management, Vol. 38, pp. 487-98.
    • (2001) Information & Management , vol.38 , pp. 487-498
    • Jung, B.1    Han, I.2    Lee, S.3
  • 19
    • 0002904380 scopus 로고
    • "Organizational characteristics and information systems planning: An empirical study"
    • King, W.R. (1994), "Organizational characteristics and information systems planning: An empirical study", Information Systems Research, Vol. 5 No. 2, pp. 75-109.
    • (1994) Information Systems Research , vol.5 , Issue.2 , pp. 75-109
    • King, W.R.1
  • 20
    • 0000133760 scopus 로고
    • "Threats to information systems: Today's reality, yesterday's understanding"
    • Loch, K.D., Carr, H.H. and Warkentin, M.E. (1992), "Threats to information systems: Today's reality, yesterday's understanding", MIS Quarterly, Vol. 16 No. 2, pp. 173-86.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 21
    • 0018012506 scopus 로고
    • "Management policies and procedures needed for effective computer security"
    • Fall
    • Madnick, E.S. (1978), "Management policies and procedures needed for effective computer security", Sloan Management Review, Fall, pp. 61-74.
    • (1978) Sloan Management Review , pp. 61-74
    • Madnick, E.S.1
  • 23
    • 0028713556 scopus 로고
    • "Development of security policies"
    • Ølnes, J. (1994), "Development of security policies", Computers & Security, Vol. 13, pp. 628-36.
    • (1994) Computers & Security , vol.13 , pp. 628-636
    • Ølnes, J.1
  • 26
  • 28
    • 84947221464 scopus 로고    scopus 로고
    • "Cyber-risk management: Technical and insurance controls for enterprise-level security"
    • Siegel, C.A., Sagalow, T.R. and Serritella, P. (2002), "Cyber-risk management: Technical and insurance controls for enterprise-level security", Security Management Practices, September/October, pp. 33-49.
    • (2002) Security Management Practices , pp. 33-49
    • Siegel, C.A.1    Sagalow, T.R.2    Serritella, P.3
  • 29
    • 0013417738 scopus 로고
    • "Computer abuse and computer security: Update on an empirical study"
    • Straub, D.W. (1986), "Computer abuse and computer security: Update on an empirical study", Security, Audit, and Control Review, Vol. 4 No. 2, pp. 21-31.
    • (1986) Security, Audit, and Control Review , vol.4 , Issue.2 , pp. 21-31
    • Straub, D.W.1
  • 30
    • 0000280419 scopus 로고
    • " Effective IS security: An empirical study"
    • Straub, D.W. (1990), " Effective IS security: An empirical study", Information Systems Research, Vol. 1 No. 3, pp. 255-76.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 31
    • 0002699431 scopus 로고
    • "Discovering and disciplining computer abuse in organization: A field study"
    • Straub, D.W. and Nance, W.D. (1990), "Discovering and disciplining computer abuse in organization: A field study", MIS Quarterly, March, pp. 45-55.
    • (1990) MIS Quarterly , pp. 45-55
    • Straub, D.W.1    Nance, W.D.2
  • 32
    • 0001133137 scopus 로고    scopus 로고
    • "Coping with systems risk: Security planning models for management decision making"
    • Straub, D.W. and Welke, R.J. (1998), "Coping with systems risk: security planning models for management decision making", MIS Quarterly, December, pp. 441-69.
    • (1998) MIS Quarterly , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 33
    • 0242517401 scopus 로고    scopus 로고
    • "Information security awareness: Educating your users effectively"
    • Thomson, M.E. and von Solms, R. (1998), "Information security awareness: Educating your users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73.
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    von Solms, R.2
  • 34
    • 0030377647 scopus 로고    scopus 로고
    • "Information security management: The second generation"
    • Von Solms, R. (1996), "Information security management: The second generation", Computers & Security, Vol. 15 No. 4, pp. 281-8.
    • (1996) Computers & Security , vol.15 , Issue.4 , pp. 281-288
    • Von Solms, R.1
  • 35
    • 3042812983 scopus 로고    scopus 로고
    • "The 10 deadly sins of information security management"
    • Von Solms, B. and von Solms, R. (2004), "The 10 deadly sins of information security management", Computer & Security, Vol. 23, pp. 371-6.
    • (2004) Computer & Security , vol.23 , pp. 371-376
    • Von Solms, B.1    von Solms, R.2
  • 37
    • 2342475711 scopus 로고    scopus 로고
    • "Towards information security behavioural compliance"
    • Vroom, C. and von Solms, R. (2004), "Towards information security behavioural compliance", Computers & Security, Vol. 23, pp. 191-8.
    • (2004) Computers & Security , vol.23 , pp. 191-198
    • Vroom, C.1    von Solms, R.2
  • 39
    • 1242265154 scopus 로고    scopus 로고
    • "In defense of the realm: Understanding the threats to information security"
    • Whitman, M.E. (2004), "In defense of the realm: Understanding the threats to information security", International Journal of Information Management, Vol. 24, pp. 43-57.
    • (2004) International Journal of Information Management , vol.24 , pp. 43-57
    • Whitman, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.