메뉴 건너뛰기




Volumn 44, Issue 5, 2007, Pages 480-491

Threats and countermeasures for information system security: A cross-industry study

Author keywords

Countermeasures; IS security; IS threats; Security adoption; Threat mitigation

Indexed keywords

INFORMATION SYSTEM SECURITY; SECURITY ADOPTION; SECURITY COUNTERMEASURES; THREAT MITIGATION;

EID: 34447298085     PISSN: 03787206     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.im.2007.05.003     Document Type: Article
Times cited : (110)

References (35)
  • 1
    • 33750323023 scopus 로고    scopus 로고
    • Plant information systems, manufacturing capabilities, and plant performance
    • Banker R.D., Bardhan I.R., Chang H., and Lin S. Plant information systems, manufacturing capabilities, and plant performance. MIS Quarterly 30 2 (2006) 315-337
    • (2006) MIS Quarterly , vol.30 , Issue.2 , pp. 315-337
    • Banker, R.D.1    Bardhan, I.R.2    Chang, H.3    Lin, S.4
  • 3
    • 33747462440 scopus 로고    scopus 로고
    • Taking industry seriously in information systems research
    • Chiasson M.W., and Davidson E. Taking industry seriously in information systems research. MIS Quarterly 29 4 (2005) 591-605
    • (2005) MIS Quarterly , vol.29 , Issue.4 , pp. 591-605
    • Chiasson, M.W.1    Davidson, E.2
  • 4
    • 34447318683 scopus 로고    scopus 로고
    • CNSS, National Information Assurance (IA) Glossary (CNSS Instruction No. 4009), Committee on National Security Systems, revised in June 2006, http://www.cnss.gov/instructions.html (cited July 5, 2006).
  • 6
    • 0034158883 scopus 로고    scopus 로고
    • Information security management: a hierarchical framework for various approaches
    • Eloff M.M., and von Solms S.H. Information security management: a hierarchical framework for various approaches. Computers and Security 19 3 (2000) 243-256
    • (2000) Computers and Security , vol.19 , Issue.3 , pp. 243-256
    • Eloff, M.M.1    von Solms, S.H.2
  • 8
    • 0026054207 scopus 로고
    • Information systems management and strategy formulation: the "stages of growth" model revisited
    • Galliers R.D., and Sutherland A.R. Information systems management and strategy formulation: the "stages of growth" model revisited. Journal of Information Systems 1 (1991) 89-114
    • (1991) Journal of Information Systems , vol.1 , pp. 89-114
    • Galliers, R.D.1    Sutherland, A.R.2
  • 9
  • 10
    • 0001823869 scopus 로고
    • Security concerns of system users: a study of perceptions of the adequacy of security
    • Goodhue D.L., and Straub D.W. Security concerns of system users: a study of perceptions of the adequacy of security. Information and Management 20 1 (1991) 13-22
    • (1991) Information and Management , vol.20 , Issue.1 , pp. 13-22
    • Goodhue, D.L.1    Straub, D.W.2
  • 12
    • 39749159243 scopus 로고
    • Electronic data interchange and small organizations: adoption and impact of technology
    • Iacovou C.L., Benbasat I., and Dexter A.S. Electronic data interchange and small organizations: adoption and impact of technology. MIS Quarterly 19 4 (1995) 465-485
    • (1995) MIS Quarterly , vol.19 , Issue.4 , pp. 465-485
    • Iacovou, C.L.1    Benbasat, I.2    Dexter, A.S.3
  • 14
    • 0035479209 scopus 로고    scopus 로고
    • Security threats to Internet: a Korean multi-industry investigation
    • Jung B., Han I., and Lee S. Security threats to Internet: a Korean multi-industry investigation. Information and Management 38 8 (2001) 487-498
    • (2001) Information and Management , vol.38 , Issue.8 , pp. 487-498
    • Jung, B.1    Han, I.2    Lee, S.3
  • 16
    • 0002904380 scopus 로고
    • Organizational characteristics and information systems planning: an empirical study
    • King W.R. Organizational characteristics and information systems planning: an empirical study. Information Systems Research 5 2 (1994) 75-109
    • (1994) Information Systems Research , vol.5 , Issue.2 , pp. 75-109
    • King, W.R.1
  • 17
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic A.G., and Clark J.G. Why there aren't more information security research studies. Information and Management 41 5 (2004) 597-607
    • (2004) Information and Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 18
    • 27644548494 scopus 로고    scopus 로고
    • Impacts of globalization on e-commerce use and firm performance: a cross-country investigation
    • Kraemer K.L., Gibbs J., and Dedrick J. Impacts of globalization on e-commerce use and firm performance: a cross-country investigation. Information Society 21 5 (2005) 323-340
    • (2005) Information Society , vol.21 , Issue.5 , pp. 323-340
    • Kraemer, K.L.1    Gibbs, J.2    Dedrick, J.3
  • 19
    • 23344453209 scopus 로고    scopus 로고
    • Investigating factors affecting the adoption of anti-spyware systems
    • Lee Y., and Kozar K.A. Investigating factors affecting the adoption of anti-spyware systems. Communications of the ACM 48 8 (2005) 72-78
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 72-78
    • Lee, Y.1    Kozar, K.A.2
  • 20
    • 0000133760 scopus 로고
    • Threats to information systems: today's reality, yesterday's understanding
    • Loch K.D., Carr H.H., and Warkentin M.E. Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 16 2 (1992) 173-186
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 21
    • 0009222571 scopus 로고    scopus 로고
    • The management and control of information in high-technology firms
    • Mohr J.J. The management and control of information in high-technology firms. The Journal of High Technology Management Research 7 2 (1996) 245-268
    • (1996) The Journal of High Technology Management Research , vol.7 , Issue.2 , pp. 245-268
    • Mohr, J.J.1
  • 23
    • 0028713556 scopus 로고
    • Development of security policies
    • Olnes J. Development of security policies. Computers and Security 13 8 (1994) 628-636
    • (1994) Computers and Security , vol.13 , Issue.8 , pp. 628-636
    • Olnes, J.1
  • 26
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute http://www.gocsi.com/ (cited September 20, 2003)
    • Richardson R. 2003 CSI/FBI Computer Crime and Security Survey (2003), Computer Security Institute. http://www.gocsi.com/ http://www.gocsi.com/ (cited September 20, 2003)
    • (2003) 2003 CSI/FBI Computer Crime and Security Survey
    • Richardson, R.1
  • 28
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organization: a field study
    • Straub D.W., and Nance W.D. Discovering and disciplining computer abuse in organization: a field study. MIS Quarterly (1990) 45-55
    • (1990) MIS Quarterly , pp. 45-55
    • Straub, D.W.1    Nance, W.D.2
  • 29
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: security planning models for management decision making
    • Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly (1998) 441-469
    • (1998) MIS Quarterly , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 30
    • 0141919268 scopus 로고    scopus 로고
    • The IS risk analysis based on a business model
    • Suh B., and Han I. The IS risk analysis based on a business model. Information and Management 41 2 (2003) 149-158
    • (2003) Information and Management , vol.41 , Issue.2 , pp. 149-158
    • Suh, B.1    Han, I.2
  • 31
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • von Solms B., and von Solms R. The 10 deadly sins of information security management. Computers and Security 23 5 (2004) 371-376
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 371-376
    • von Solms, B.1    von Solms, R.2
  • 34
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gates: threats to information security
    • Whitman M.E. Enemy at the gates: threats to information security. Communication of the ACM 46 8 (2003) 91-95
    • (2003) Communication of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.E.1
  • 35
    • 0000019603 scopus 로고
    • An examination of push-pull theory applied to process innovation in knowledge work
    • Zmud R.W. An examination of push-pull theory applied to process innovation in knowledge work. Management Science 30 6 (1984) 727-738
    • (1984) Management Science , vol.30 , Issue.6 , pp. 727-738
    • Zmud, R.W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.