메뉴 건너뛰기




Volumn 47, Issue 3, 2007, Pages 105-110

Empiracal study of students' computer security practices/perceptions

Author keywords

Computer security; Student perceptions; Student practices

Indexed keywords

ANTI-VIRUS PROGRAMS; COMPUTER INFORMATION SYSTEMS; COMPUTING ENVIRONMENTS; EMPIRICAL STUDIES; INFORMATION SHARING; SCIENCE AND TECHNOLOGY; STUDENT PERCEPTIONS; UNIVERSITY STUDENTS;

EID: 34249651786     PISSN: 08874417     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (23)

References (29)
  • 1
    • 0035995871 scopus 로고    scopus 로고
    • Security in the information systems curriculum: Identification and status of relevant issues
    • Anderson, J. E. and Schwager, P. H., "Security in the information systems curriculum: Identification and status of relevant issues," Journal of Computer Information Systems, (42:3), 2002, pp. 16-24.
    • (2002) Journal of Computer Information Systems , vol.42 , Issue.3 , pp. 16-24
    • Anderson, J.E.1    Schwager, P.H.2
  • 2
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computing practices: A rational choice perspective
    • Aytes, K. and Connolly T., "Computer security and risky computing practices: A rational choice perspective," Journal of Organizational and End User Computing, (16:3), 2004, pp. 22-40.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 3
    • 34249741951 scopus 로고    scopus 로고
    • Computer worm threat escalates,
    • August 19
    • Bank, D., "Computer worm threat escalates," Wall Street Journal, August 19, 2005, pp. B4.
    • (2005) Wall Street Journal
    • Bank, D.1
  • 4
    • 0035551934 scopus 로고    scopus 로고
    • Entry-level if job skills: A survey of employers
    • Cappel, J., "Entry-level if job skills: a survey of employers," Journal of Computer Information Systems, (42:2), 2001/2002, pp. 76-83.
    • (2001) Journal of Computer Information Systems , vol.42 , Issue.2 , pp. 76-83
    • Cappel, J.1
  • 5
    • 84876632761 scopus 로고    scopus 로고
    • CERT/CC Statistics 1988-2005, http://www.cert.org/stats/cert_stats.html, 2005, accessed April 18, 2006.
    • CERT/CC Statistics 1988-2005, http://www.cert.org/stats/cert_stats.html, 2005, accessed April 18, 2006.
  • 6
    • 84876642493 scopus 로고    scopus 로고
    • Clarke, R., Forum on technology and innovation: Sponsored by Sen. Bill Frist (R-TN), Sen. Jay Rockefeller (DWV), and the Council on Competitiveness, http://www.techlawjournal.com/security/20020214.asp, 2002, accessed September 21, 2005.
    • Clarke, R., "Forum on technology and innovation: Sponsored by Sen. Bill Frist (R-TN), Sen. Jay Rockefeller (DWV), and the Council on Competitiveness," http://www.techlawjournal.com/security/20020214.asp, 2002, accessed September 21, 2005.
  • 7
    • 84876654748 scopus 로고    scopus 로고
    • accessed October 25, 2004
    • CNNMoney, "Home PCs not so safe?" http://money.cnn.com/2004/10/ 25/technology, 2004, accessed October 25, 2004.
    • (2004) Home PCs not so safe
    • CNNMoney1
  • 9
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Toward socio-organizational perspectives
    • Dhillon, G., and Blackhouse, J., "Current directions in IS security research: Toward socio-organizational perspectives," Information Systems Journal, (11:2), 2001, pp. 127-153.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Blackhouse, J.2
  • 10
    • 0037903781 scopus 로고    scopus 로고
    • Changes in student computer technology attitudes over time
    • Duffy, T. J. and Walstrom, K. A., "Changes in student computer technology attitudes over time," Journal of Computer Information Systems, (43:3), 2003, pp. 27-33.
    • (2003) Journal of Computer Information Systems , vol.43 , Issue.3 , pp. 27-33
    • Duffy, T.J.1    Walstrom, K.A.2
  • 12
    • 34249672161 scopus 로고    scopus 로고
    • College face rising costs for computer security
    • Foster, A. L., "College face rising costs for computer security," Chronicle of Higher Education, (LI:17), 2004, pp. A1.
    • (2004) Chronicle of Higher Education , vol.51 , Issue.17
    • Foster, A.L.1
  • 13
    • 84951714571 scopus 로고    scopus 로고
    • Arming yourself in the virus war
    • Goldsborough, R., "Arming yourself in the virus war," Tech Directions, (63:8), 2004, pp. 14.
    • (2004) Tech Directions , vol.63 , Issue.8 , pp. 14
    • Goldsborough, R.1
  • 14
    • 34249724127 scopus 로고    scopus 로고
    • Investment in security training on the wrong track, say senior staff
    • 29 November
    • Goodwin, B., "Investment in security training on the wrong track, say senior staff," Computer Weekly, 29 November, 2005. pp. 58.
    • (2005) Computer Weekly , pp. 58
    • Goodwin, B.1
  • 16
    • 20744447916 scopus 로고    scopus 로고
    • Perceptions of end-users on the requirements in personal firewall software: An exploratory study
    • Hazari, S., "Perceptions of end-users on the requirements in personal firewall software: An exploratory study," Journal of Organizational and End User Computing, (17:3), 2005, pp. 47-65.
    • (2005) Journal of Organizational and End User Computing , vol.17 , Issue.3 , pp. 47-65
    • Hazari, S.1
  • 17
    • 0037530622 scopus 로고    scopus 로고
    • Careless about privacy
    • Hinde, S., "Careless about privacy," Computers & Security, (22:4), 2003, pp. 284-288.
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 284-288
    • Hinde, S.1
  • 18
    • 34249736781 scopus 로고    scopus 로고
    • What you should know about customer privacy management
    • Article No. R-21-1912
    • Janowski, W., "What you should know about customer privacy management," Gartner Advisory Intra Web Database, 2003, Article No. R-21-1912.
    • (2003) Gartner Advisory Intra Web Database
    • Janowski, W.1
  • 19
    • 84876616498 scopus 로고    scopus 로고
    • Jaques, R., Demand for IT security pros growing fast, PC Magazine, http://www.pcmag.co.uk/print/1159247, 2004, accessed November 15, 2004.
    • Jaques, R., "Demand for IT security pros growing fast," PC Magazine, http://www.pcmag.co.uk/print/1159247, 2004, accessed November 15, 2004.
  • 20
    • 33644623016 scopus 로고    scopus 로고
    • Protect your business against dangerous information leaks
    • Kirkpatrick, J., "Protect your business against dangerous information leaks," Machine Design, (78:3), 2006, pp. 66.
    • (2006) Machine Design , vol.78 , Issue.3 , pp. 66
    • Kirkpatrick, J.1
  • 21
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behavior
    • Leach, J., "Improving user security behavior," Computers and Security, (22:8), 2003, pp. 685-692.
    • (2003) Computers and Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 22
    • 0037343554 scopus 로고    scopus 로고
    • Web services: An analysis of the technology, its benefits, and implementation difficulties
    • Lim, B. and Wen, H. J., "Web services: An analysis of the technology, its benefits, and implementation difficulties," Information Systems Management, (20:2), 2003, pp. 49-57.
    • (2003) Information Systems Management , vol.20 , Issue.2 , pp. 49-57
    • Lim, B.1    Wen, H.J.2
  • 23
    • 27544484573 scopus 로고    scopus 로고
    • Facilitating conditions, wireless trust and adoption intention
    • Lu, J., Yu, C. S., and Liu, C., "Facilitating conditions, wireless trust and adoption intention," Journal of Computer Information Systems, (46:1), 2005, pp. 15-25.
    • (2005) Journal of Computer Information Systems , vol.46 , Issue.1 , pp. 15-25
    • Lu, J.1    Yu, C.S.2    Liu, C.3
  • 24
    • 0038633244 scopus 로고    scopus 로고
    • CDC's new epidemic: An investigation into awareness, attitudes, actions, and knowledge of computer viruses among students utilizing campus computer labs
    • Monds, K. E., and Wang, C., "CDC's new epidemic: An investigation into awareness, attitudes, actions, and knowledge of computer viruses among students utilizing campus computer labs," Journal of Computer Information Systems, (43:3), 2003, 118-126.
    • (2003) Journal of Computer Information Systems , vol.43 , Issue.3 , pp. 118-126
    • Monds, K.E.1    Wang, C.2
  • 25
    • 34249671060 scopus 로고    scopus 로고
    • Operations security awareness: The mind has no firewall
    • Rhodes, K. A., "Operations security awareness: The mind has no firewall," Computer Security Journal, (17:3), 2001, pp. 1-12.
    • (2001) Computer Security Journal , vol.17 , Issue.3 , pp. 1-12
    • Rhodes, K.A.1
  • 26
    • 2342465992 scopus 로고    scopus 로고
    • Worms and viruses: Are we losing control?
    • Schultz, E., "Worms and viruses: Are we losing control?" Computers & Security, (23:3), 2004, pp. 179-180.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 179-180
    • Schultz, E.1
  • 27
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M. T., "A conceptual foundation for organizational information security awareness," Information Management & Computer Security, (8:1), 2000, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 28
    • 34249718240 scopus 로고    scopus 로고
    • Human factor derails best-laid security plans
    • Tuesday, V., "Human factor derails best-laid security plans," Computerworld, (35:18), 2001, pp. 52.
    • (2001) Computerworld , vol.35 , Issue.18 , pp. 52
    • Tuesday, V.1
  • 29
    • 84876627244 scopus 로고    scopus 로고
    • US Census Bureau, http://www.census.gov/mrts/www/current.html, 2004, accessed October 27, 2004.
    • US Census Bureau, http://www.census.gov/mrts/www/current.html, 2004, accessed October 27, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.