메뉴 건너뛰기




Volumn 8, Issue 4, 2006, Pages 24-34

Securing e-learning systems: A case of insider cyber attacks and novice IT management in a small university

Author keywords

Cyber crime; e learning systems; e learning systems security; Insider cyber attack; Insider cyber threats; Insider IS misuse; IT policies; IT procedures

Indexed keywords

CYBERNETICS; INFORMATION MANAGEMENT; INFORMATION RETRIEVAL SYSTEMS; INFORMATION TECHNOLOGY; INTERNET;

EID: 33846206084     PISSN: 15487717     EISSN: 15487725     Source Type: Journal    
DOI: 10.4018/jcit.2006100103     Document Type: Article
Times cited : (38)

References (23)
  • 3
    • 85039135890 scopus 로고    scopus 로고
    • Freeh, J. L. (2000). Congressional testimony of FBI director on cybercrime. Testimony before the U.S. Senate Committee on Judiciary, Subcommittee for the Technology, Terrorism, and Government Information. Retrieved April 28, 2006, from http://www.fbi.gov/con-gress/congress00/ cyber032800.htm
    • Freeh, J. L. (2000). Congressional testimony of FBI director on "cybercrime." Testimony before the U.S. Senate Committee on Judiciary, Subcommittee for the Technology, Terrorism, and Government Information. Retrieved April 28, 2006, from http://www.fbi.gov/con-gress/congress00/ cyber032800.htm
  • 4
    • 0036602405 scopus 로고    scopus 로고
    • Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
    • Garfinkel, R., Gopal, R., & Goes, P. (2002). Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Science 48(6), 749-764.
    • (2002) Management Science , vol.48 , Issue.6 , pp. 749-764
    • Garfinkel, R.1    Gopal, R.2    Goes, P.3
  • 5
    • 0013303131 scopus 로고    scopus 로고
    • A cop on the beat: Collecting and appraising intrusive evidence
    • Goan, T. (1999). A cop on the beat: Collecting and appraising intrusive evidence. Communications of the ACM, 42(7), 46-53.
    • (1999) Communications of the ACM , vol.42 , Issue.7 , pp. 46-53
    • Goan, T.1
  • 7
    • 36649033944 scopus 로고    scopus 로고
    • Guest editorial: Security management: Two sides of the same coin
    • Hale, J., & Brusil, P. J. (2004). Guest editorial: Security management: Two sides of the same coin. Journal of Network and Systems Management, 12(1), 1-8.
    • (2004) Journal of Network and Systems Management , vol.12 , Issue.1 , pp. 1-8
    • Hale, J.1    Brusil, P.J.2
  • 12
    • 85039136995 scopus 로고    scopus 로고
    • Levy, Y., & Ramim, M. (2004). Financing expensive technologies in an era of decreased funding: Think Big... Start Small... Build Fast... In C. Howard, K. Schuenk, & R. Discenza (Eds.), Distance learning and university effectiveness: Changing educational paradigms for online learning (pp. 278-301). Hershey, PA: Idea Group Publishing.
    • Levy, Y., & Ramim, M. (2004). Financing expensive technologies in an era of decreased funding: Think Big... Start Small... Build Fast... In C. Howard, K. Schuenk, & R. Discenza (Eds.), Distance learning and university effectiveness: Changing educational paradigms for online learning (pp. 278-301). Hershey, PA: Idea Group Publishing.
  • 13
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of IT misuse
    • Magklaras, G. B., & Furnell, S. M. (2002). Insider threat prediction tool: Evaluating the probability of IT misuse. Computers & Security, 21(1), 62-73.
    • (2002) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 14
    • 27544488062 scopus 로고    scopus 로고
    • Towards an understanding and definition of academic misconduct in online learning environments
    • April 7-9, Fort Lauderdale, Florida
    • Ramim, M. (2005, April 7-9). Towards an understanding and definition of academic misconduct in online learning environments. In Proceedings of IEEE SoutheastCon 2005 (pp. 641-650), Fort Lauderdale, Florida.
    • (2005) Proceedings of IEEE SoutheastCon 2005 , pp. 641-650
    • Ramim, M.1
  • 16
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, access control, and audit
    • Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys, 28(1), 241-243.
    • (1996) ACM Computing Surveys , vol.28 , Issue.1 , pp. 241-243
    • Sandhu, R.1    Samarati, P.2
  • 18
    • 33846215366 scopus 로고    scopus 로고
    • IDS products lead sales surge
    • Schultz, E. (2003). IDS products lead sales surge. Computers & Security, 22(8), 660.
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 660
    • Schultz, E.1
  • 21
    • 85039135598 scopus 로고    scopus 로고
    • U.S. Department of Justice, Retrieved April 28, 2006, from
    • U.S. Department of Justice. (2002). Fraud and related activity in connection with computers. Retrieved April 28, 2006, from http://www.usdoj.gov/ criminal/cybercrime/1030_new.html
    • (2002) Fraud and related activity in connection with computers
  • 22
    • 11144307987 scopus 로고    scopus 로고
    • Wang, B., & Paper, D. (2005). A case of an IT-enabled organizational change intervention: The missing pieces. Journal of Cases on Information Technology, 7(1), 34-52.
    • Wang, B., & Paper, D. (2005). A case of an IT-enabled organizational change intervention: The missing pieces. Journal of Cases on Information Technology, 7(1), 34-52.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.