메뉴 건너뛰기




Volumn 108, Issue 6, 2008, Pages 701-712

Why users (fail to) read computer usage policies

Author keywords

Business policy; Computers; Crimes; Individual behaviour; Information systems

Indexed keywords

COMPUTER CRIME; SECURITY SYSTEMS; STUDENTS;

EID: 46749091723     PISSN: 02635577     EISSN: None     Source Type: Journal    
DOI: 10.1108/02635570810883969     Document Type: Article
Times cited : (42)

References (40)
  • 3
    • 0347892655 scopus 로고    scopus 로고
    • Hack attack: cyberthieves siphon millions from US firms
    • Anthes, G.H. (1996), “Hack attack: cyberthieves siphon millions from US firms”, Computerworld, Vol. 30 No. 16, p. 81.
    • (1996) Computerworld , vol.30 , Issue.16 , pp. 81
    • Anthes, G.H.1
  • 4
    • 18844372566 scopus 로고
    • Public knowledge of criminal penalties
    • Assembly Committee on Criminal Procedure (State of California) Columbia University Press New York, NY
    • Assembly Committee on Criminal Procedure (State of California) (1975), “Public knowledge of criminal penalties”, in Ed. Henshel, R.L. and Ed. Silverman, R.A. (Eds), Perception in Criminology, Columbia University Press, New York, NY, pp. 74-90.
    • (1975) Perception in Criminology , pp. 74-90
    • Henshel, R.L.1    Silverman, R.A.2
  • 5
    • 0001156375 scopus 로고
    • Managing computer crime: a research outlook
    • Backhouse, J. and Dhillon, G. (1995), “Managing computer crime: a research outlook”, Computers and Security, Vol. 14 No. 7, pp. 645-651.
    • (1995) Computers and Security , vol.14 , Issue.7 , pp. 645-651
    • Backhouse, J.1    Dhillon, G.2
  • 6
    • 28844460781 scopus 로고
    • Predicting dishonest actions using the theory of planned behavior
    • Beck, L. and Ajzen, I. (1991), “Predicting dishonest actions using the theory of planned behavior”, Journal of Research in Personality, Vol. 25 No. 3, pp. 285-301.
    • (1991) Journal of Research in Personality , vol.25 , Issue.3 , pp. 285-301
    • Beck, L.1    Ajzen, I.2
  • 8
    • 46749109854 scopus 로고    scopus 로고
    • Delaware board sets computer-use policy
    • October 11 www.thedailystar.com/archivesearch/local_story_ 284040041.html available at (accessed April 4, 2008).
    • Breakey, P. (2007), “Delaware board sets computer-use policy”, Knight Ridder Tribune Business News, October 11, available at: www.thedailystar.com/archivesearch/local_story_ 284040041.html (accessed April 4, 2008).
    • (2007) Knight Ridder Tribune Business News
    • Breakey, P.1
  • 9
    • 84992928616 scopus 로고    scopus 로고
    • Firefighters put on suspension: technician finds sexual images on Timberlake district's computers
    • April 11
    • Brodwater, T. (2007), “Firefighters put on suspension: technician finds sexual images on Timberlake district's computers”, Knight Ridder Tribune Business News, April 11, p. 1.
    • (2007) Knight Ridder Tribune Business News , pp. 1
    • Brodwater, T.1
  • 10
    • 0010154421 scopus 로고
    • General deterrence: research and theory
    • Buikhuisen, W. (1974), “General deterrence: research and theory”, Abstracts on Criminology and Penology, Vol. 14 No. 3, pp. 285-8.
    • (1974) Abstracts on Criminology and Penology , vol.14 , Issue.3 , pp. 285-288
    • Buikhuisen, W.1
  • 11
    • 0003552195 scopus 로고    scopus 로고
    • Russell Sage Foundation New York, NY
    • Cook, K.S. (Ed.) (2001), Trust in Society, Russell Sage Foundation, New York, NY.
    • (2001) Trust in Society
    • Cook, K.S.1
  • 12
    • 21144478161 scopus 로고
    • Accessibility and stability of predictors in the theory of planned behavior
    • Doll, J. and Ajzen, I. (1992), “Accessibility and stability of predictors in the theory of planned behavior”, Journal of Personality and Social Psychology, Vol. 63 No. 5, pp. 754-764.
    • (1992) Journal of Personality and Social Psychology , vol.63 , Issue.5 , pp. 754-764
    • Doll, J.1    Ajzen, I.2
  • 14
    • 46749158934 scopus 로고    scopus 로고
    • Behind the numbers: the FBI cyber-crime survey results
    • http://govtsecurity.com/mag/behind_numbers_fbi/ Government Security web site (accessed August 1, 2004).
    • Flickes, M. (2004), “Behind the numbers: the FBI cyber-crime survey results”, Government Security web site, http://govtsecurity.com/mag/behind_numbers_fbi/ (accessed August 1, 2004).
    • (2004)
    • Flickes, M.1
  • 17
    • 0000009769 scopus 로고
    • Evaluating structural equation models with unobservable variables and measurement error
    • Fornell, C. and Larcker, D. (1981), “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research, Vol. 18, pp. 89-98.
    • (1981) Journal of Marketing Research , vol.18 , pp. 89-98
    • Fornell, C.1    Larcker, D.2
  • 20
    • 46749127595 scopus 로고    scopus 로고
    • Formulating an effective computer use policy
    • Holmes, J. (2003), “Formulating an effective computer use policy”, Information Strategy: The Executive's Journal, Vol. 20 No. 1, pp. 26-33.
    • (2003) Information Strategy: The Executive's Journal , vol.20 , Issue.1 , pp. 26-33
    • Holmes, J.1
  • 23
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • Lee, J. and Lee, Y. (2002), “A holistic model of computer abuse within organizations”, Information Management & Computer Security, Vol. 10 No. 2, pp. 57-63.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 24
    • 28644441165 scopus 로고    scopus 로고
    • Attitude toward ethical behavior in computer use: a shifting model
    • Leonard, L.N.K. and Cronan, T.P. (2005), “Attitude toward ethical behavior in computer use: a shifting model”, Industrial Management & Data Systems, Vol. 105 No. 9, pp. 1150-71.
    • (2005) Industrial Management & Data Systems , vol.105 , Issue.9 , pp. 1150-1171
    • Leonard, L.N.K.1    Cronan, T.P.2
  • 25
    • 46749122477 scopus 로고    scopus 로고
    • Commentary: use of employer's e-mail in attorney-client communication raises privilege concerns
    • January 3
    • Lindquist, C.D. (2008), “Commentary: use of employer's e-mail in attorney-client communication raises privilege concerns”, Daily Record, January 3, p. 1.
    • (2008) Daily Record , pp. 1
    • Lindquist, C.D.1
  • 26
    • 0002172779 scopus 로고
    • A comparison of the theory of planned behavior and the theory of reasoned action
    • Madden, T.J., Ellen, P.S. and Ajzen, I. (1992), “A comparison of the theory of planned behavior and the theory of reasoned action”, Personality and Social Psychology Bulletin, Vol. 18 No. 1, pp. 3-9.
    • (1992) Personality and Social Psychology Bulletin , vol.18 , Issue.1 , pp. 3-9
    • Madden, T.J.1    Ellen, P.S.2    Ajzen, I.3
  • 28
  • 30
    • 1642568988 scopus 로고
    • Computer fraud – what can be done about it?
    • Romney, M. (1995), “Computer fraud – what can be done about it?”, The CPA Journal, Vol. 65 No. 5, pp. 30-33.
    • (1995) The CPA Journal , vol.65 , Issue.5 , pp. 30-33
    • Romney, M.1
  • 32
    • 0034086124 scopus 로고    scopus 로고
    • The influence of trust and perceptions of risks and benefits on the acceptance of gene technology
    • Siegrist, M. (2000), “The influence of trust and perceptions of risks and benefits on the acceptance of gene technology”, Risk Analysis, Vol. 20 No. 2, pp. 195-203.
    • (2000) Risk Analysis , vol.20 , Issue.2 , pp. 195-203
    • Siegrist, M.1
  • 33
    • 0033653855 scopus 로고    scopus 로고
    • Perception of hazards: the role of social trust and knowledge
    • Siegrist, M. and Cvetkovich, G. (2000), “Perception of hazards: the role of social trust and knowledge”, Risk Analysis, Vol. 20 No. 5, pp. 713-9.
    • (2000) Risk Analysis , vol.20 , Issue.5 , pp. 713-719
    • Siegrist, M.1    Cvetkovich, G.2
  • 34
    • 0033884025 scopus 로고    scopus 로고
    • Salient value similarity, social trust, and risk/benefit perception
    • Siegrist, M., Cvetkovich, G. and Roth, C. (2000), “Salient value similarity, social trust, and risk/benefit perception”, Risk Analysis, Vol. 20 No. 3, pp. 353-362.
    • (2000) Risk Analysis , vol.20 , Issue.3 , pp. 353-362
    • Siegrist, M.1    Cvetkovich, G.2    Roth, C.3
  • 35
    • 1542626402 scopus 로고
    • Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment
    • dissertation Graduate School of Business Indiana University, Bloomington, IN.
    • Straub, D.W. (1986), “Deterring computer abuse: the effectiveness of deterrent countermeasures in the computer security environment”, dissertation, Graduate School of Business, Indiana University, Bloomington, IN.
    • (1986)
    • Straub, D.W.1
  • 37
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: a field study
    • Straub, D.W. and Nance, W.D. (1990), “Discovering and disciplining computer abuse in organizations: a field study”, MIS Quarterly, Vol. 14 No. 1, pp. 45-60.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 38
    • 73549120882 scopus 로고
    • Understanding information technology usage: a test of competing models
    • Taylor, S. and Todd, P.A. (1995), “Understanding information technology usage: a test of competing models”, Information Systems Research, Vol. 6 No. 2, pp. 144-176.
    • (1995) Information Systems Research , vol.6 , Issue.2 , pp. 144-176
    • Taylor, S.1    Todd, P.A.2
  • 39
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: toward a unified view
    • Vankatesh, V., Morris, M., Davis, G. and Davis, F. (2003), “User acceptance of information technology: toward a unified view”, MIS Quarterly, Vol. 27 No. 3, pp. 425-478.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Vankatesh, V.1    Morris, M.2    Davis, G.3    Davis, F.4
  • 40
    • 33845763496 scopus 로고    scopus 로고
    • Individual characteristics and ethical decision-making in an IT context
    • Haines, R. and Leonard, L.N.K. (2007), “Individual characteristics and ethical decision-making in an IT context”, Industrial Management & Data Systems, Vol. 107 No. 1, pp. 5-20.
    • (2007) Industrial Management & Data Systems , vol.107 , Issue.1 , pp. 5-20
    • Haines, R.1    Leonard, L.N.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.