메뉴 건너뛰기




Volumn 50, Issue 10, 2007, Pages 113-117

Deterring internal information systems misuse

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; EDUCATION; REGULATORY COMPLIANCE; SECURITY OF DATA;

EID: 34848873123     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/1290958.1290971     Document Type: Article
Times cited : (99)

References (12)
  • 4
    • 34848859114 scopus 로고    scopus 로고
    • InformationWeek. U.S. Information Security Research Report. InformationWeek (Aug. 29, 2005); www.informationweek.com/reports/ showReport.jhtml?articleID=170100861.
    • InformationWeek. U.S. Information Security Research Report. InformationWeek (Aug. 29, 2005); www.informationweek.com/reports/ showReport.jhtml?articleID=170100861.
  • 5
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • Lee, J. and Lee, Y. A holistic model of computer abuse within organizations. Information Management & Computer Security 10, 2 (2002), 57-63.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 6
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee, S.M., Lee, S.-G., and Yoo, S. An integrative model of computer abuse based on social control and general deterrence theories. Information and Management 41, 6 (2004), 707-718.
    • (2004) Information and Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.-G.2    Yoo, S.3
  • 8
    • 34848882942 scopus 로고    scopus 로고
    • The weakest link
    • Oct. 26
    • Standage, T. The weakest link. The Economist (Oct. 26, 2002), 11-14.
    • (2002) The Economist , pp. 11-14
    • Standage, T.1
  • 10
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Dec
    • Straub, D. and Welke, R. Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22, 4 (Dec. 1998), 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.1    Welke, R.2
  • 11
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. Effective IS security: An empirical study. Information Systems Research 1, 3 (1990), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.