메뉴 건너뛰기




Volumn 36, Issue 4, 2005, Pages 68-79

A Longitudinal Study of Information System Threat Categories: The Enduring Problem of Human Error

Author keywords

Computer Security; Human Error; Information Infrastructure Protection; Information Security; Information System Threat; Information System Threat Taxonomy; Software Defects; Software Quality and Reliability

Indexed keywords


EID: 33751161222     PISSN: 00950033     EISSN: None     Source Type: Journal    
DOI: 10.1145/1104004.1104010     Document Type: Article
Times cited : (82)

References (46)
  • 2
    • 0002587924 scopus 로고
    • Skilled Incompetence
    • Argyris, C. (1986). “Skilled Incompetence,” Harvard Business Review, Vol. 64, No. 5, pp. 74–79.
    • (1986) Harvard Business Review , vol.64 , Issue.5 , pp. 74-79
    • Argyris, C.1
  • 5
    • 33751175322 scopus 로고    scopus 로고
    • A Taxonomy for Analyzing Hazards to Information Systems
    • Katsikas, S. and Gritzalis, D. (Eds.), London: Chapman & Hall
    • Baskerville, R. (1996). “A Taxonomy for Analyzing Hazards to Information Systems,” in Katsikas, S. and Gritzalis, D. (Eds.), Information Systems Security: Facing the Information Society, London: Chapman & Hall, pp. 167–176.
    • (1996) Information Systems Security: Facing the Information Society , pp. 167-176
    • Baskerville, R.1
  • 7
    • 85024255066 scopus 로고    scopus 로고
    • First Workshop on Evaluating and Architecting System Dependability (EASY ‘01), Goteborg, Sweden
    • Brown, A. B. and Patterson, D. A. (2001). “To Err is Human,” First Workshop on Evaluating and Architecting System Dependability (EASY ‘01), Goteborg, Sweden.
    • (2001) To Err is Human
    • Brown, A.B.1    Patterson, D.A.2
  • 8
    • 0030701247 scopus 로고    scopus 로고
    • Information System Attacks: A Preliminary Classification Scheme
    • Cohen, F. (1997). “Information System Attacks: A Preliminary Classification Scheme,” Computers & Security, Vol. 16, No. 1, pp. 29–46.
    • (1997) Computers & Security , vol.16 , Issue.1 , pp. 29-46
    • Cohen, F.1
  • 11
    • 0007551808 scopus 로고    scopus 로고
    • Managing and controlling computer misuse
    • Dhillon, G. (1999). “Managing and controlling computer misuse,” Information Management & Computer Security, Vol. 7, No. 4, pp. 171–175.
    • (1999) Information Management & Computer Security , vol.7 , Issue.4 , pp. 171-175
    • Dhillon, G.1
  • 12
    • 0003335017 scopus 로고    scopus 로고
    • Challenges in Managing Information Security in the New Millennium
    • Dhillon, G. (Ed.), Hershey, PA: Idea Group Publishing
    • Dhillon, G. (2001a). “Challenges in Managing Information Security in the New Millennium,” in Dhillon, G. (Ed.), Information Security Management: Global Challenges in the New Millennium, Hershey, PA: Idea Group Publishing, pp. 1–8.
    • (2001) Information Security Management: Global Challenges in the New Millennium , pp. 1-8
    • Dhillon, G.1
  • 13
    • 0003335017 scopus 로고    scopus 로고
    • Principles for Managing Information Security in the New Millennium
    • Dhillon, G. (Ed.), Hershey, PA: Idea Group Publishing
    • Dhillon, G. (2001b). “Principles for Managing Information Security in the New Millennium,” in Dhillon, G. (Ed.), Information Security Management: Global Challenges in the New Millennium, Hershey, PA: Idea Group Publishing, pp. 173–177.
    • (2001) Information Security Management: Global Challenges in the New Millennium , pp. 173-177
    • Dhillon, G.1
  • 14
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon, G. and Backhouse, J. (2000). “Information system security management in the new millennium,” Communications of the ACM, Vol. 43, No. 7, pp. 125–128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 15
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio organizational perspectives
    • Dhillon, G. and Backhouse, J. (2001). “Current directions in IS security research: Towards socio organizational perspectives.,” Information Systems Journal, Vol. 11, No. 2, pp. 127–153.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 19
    • 85008048174 scopus 로고    scopus 로고
    • The Future of Systems Research
    • Hennessy, J. (1999). “The Future of Systems Research,” Computer, Vol. 32, No. 8, pp. 27–33.
    • (1999) Computer , vol.32 , Issue.8 , pp. 27-33
    • Hennessy, J.1
  • 21
    • 28044434952 scopus 로고    scopus 로고
    • (accessed August 2004)
    • Internet Systems Consortium, Inc. (2004). ISC Internet Domain Survey, http://www.isc.org/ds/(accessed August 2004)
    • (2004) ISC Internet Domain Survey
  • 22
    • 0002039535 scopus 로고
    • Diagnosing the human threats to information technology implementation: A missing factor in systems analysis illustrated in a case study
    • Levine, H. G. and Rossmoore, D. (1993). “Diagnosing the human threats to information technology implementation: A missing factor in systems analysis illustrated in a case study,” Journal of Management Information Systems, Vol. 10, No. 2, p. 55.
    • (1993) Journal of Management Information Systems , vol.10 , Issue.2 , pp. 55
    • Levine, H.G.1    Rossmoore, D.2
  • 23
    • 0000133760 scopus 로고
    • Threats to Information Systems: Today's Reality, Yesterday's Understanding
    • Loch, K. D., Carr, H. H., and Warkentin, M. E. (1992). “Threats to Information Systems: Today's Reality, Yesterday's Understanding,” MIS Quarterly, Vol. 16, No. 2, p. 173.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 25
    • 33751176377 scopus 로고    scopus 로고
    • Risks to the Public
    • No. 4
    • Neumann, P. (1992~1993). “Risks to the Public,” Software Engineering Notes, Vol. 17, No. 1, No. 4.
    • (1992) Software Engineering Notes , vol.17 , Issue.1
    • Neumann, P.1
  • 26
    • 33751176377 scopus 로고    scopus 로고
    • Risks to the Public
    • Neumann, P. (2001~2003). “Risks to the Public,” Software Engineering Notes, Vol. 28, No. 2.
    • (2001) Software Engineering Notes , vol.28 , Issue.2
    • Neumann, P.1
  • 29
    • 84976800746 scopus 로고
    • Design rules based on analysis of human error
    • Norman, D. (1983). “Design rules based on analysis of human error,” Communications of The ACM, Vol. 26, No. 4, pp. 254–258.
    • (1983) Communications of The ACM , vol.26 , Issue.4 , pp. 254-258
    • Norman, D.1
  • 32
    • 0022238997 scopus 로고
    • Software Aspects of Strategic Defense Systems
    • Parnas, D. L. (1985). “Software Aspects of Strategic Defense Systems,” Communications of the ACM, Vol. 28, No. 12, pp. 1326–1335.
    • (1985) Communications of the ACM , vol.28 , Issue.12 , pp. 1326-1335
    • Parnas, D.L.1
  • 36
    • 0004223940 scopus 로고
    • Cambridge: Cambridge University Press
    • Reason, J. (1990). Human Error, Cambridge: Cambridge University Press.
    • (1990) Human Error
    • Reason, J.1
  • 38
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Salter, J. H. and Schroeder, M. D. (1975). “The protection of information in computer systems,” Proceedings of the IEEE, Vol. 63, No. 9, pp. 1278 1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278 1308
    • Salter, J.H.1    Schroeder, M.D.2
  • 39
    • 0032223732 scopus 로고    scopus 로고
    • Differences between novice and expert systems analysts: What do we know and what do we do?
    • Schenk, K. D., Vitalari, N. P., and Davis, K. S. (1998). “Differences between novice and expert systems analysts: What do we know and what do we do?,” Journal of Management Information Systems, Vol. 15, No. 1, pp. 9–50.
    • (1998) Journal of Management Information Systems , vol.15 , Issue.1 , pp. 9-50
    • Schenk, K.D.1    Vitalari, N.P.2    Davis, K.S.3
  • 41
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W. and Welke, R. J. (1998). “Coping with systems risk: Security planning models for management decision making,” Mis Quarterly, Vol. 22, No. 4, pp. 441–469.
    • (1998) Mis Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 44
    • 1242265154 scopus 로고    scopus 로고
    • In defense of the realm: Understanding the threats to information security
    • Whitman, M. E. (2004). “In defense of the realm: Understanding the threats to information security,” International Journal of Information Management, Vol. 24, No. 1, pp. 43–57.
    • (2004) International Journal of Information Management , vol.24 , Issue.1 , pp. 43-57
    • Whitman, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.