메뉴 건너뛰기




Volumn 3, Issue 6, 2008, Pages 652-667

Knowledge management within information security: The case of Barings Bank

Author keywords

Computer fraud; KM; Knowledge Management; Management of information security; Opportunities; Technical and social aspects of information security

Indexed keywords


EID: 47049105607     PISSN: 17460972     EISSN: 17460980     Source Type: Journal    
DOI: 10.1504/IJBIS.2008.018996     Document Type: Article
Times cited : (12)

References (65)
  • 2
    • 7544250309 scopus 로고    scopus 로고
    • Audit Commission , London: HMSO
    • Audit Commission (2001) Community Safety Partnership, London: HMSO.
    • (2001) Community Safety Partnership
  • 3
    • 47049126642 scopus 로고    scopus 로고
    • Audit Commission , London: HMSO
    • Audit Commission (2005) IT Fraud and Abuse, London: HMSO.
    • (2005) IT Fraud and Abuse
  • 4
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibility and security of information systems
    • Backhouse, J. and Dhillon, G. (1996) 'Structures of responsibility and security of information systems', European Journal of Information Systems, Vol. 5, No. 1, pp.2-9.
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-9
    • Backhouse, J.1    Dhillon, G.2
  • 5
    • 0030076340 scopus 로고    scopus 로고
    • The ethics of sentencing white-collar criminals
    • Balsmeier, P. and Kelly, J. (1996) 'The ethics of sentencing white-collar criminals', Journal of Business Ethics, Vol. 15, No. 2, pp.143-152.
    • (1996) Journal of Business Ethics , vol.15 , Issue.2 , pp. 143-152
    • Balsmeier, P.1    Kelly, J.2
  • 6
    • 47049091642 scopus 로고    scopus 로고
    • Bank of England Report (1995) Report of the Board of Banking Supervision: Inquiry into the Circumstances of the Collapse of Barings HMSO.
    • Bank of England Report (1995) Report of the Board of Banking Supervision: Inquiry into the Circumstances of the Collapse of Barings HMSO.
  • 7
    • 24144458931 scopus 로고    scopus 로고
    • Information systems security from a knowledge management perspective
    • Belsis, P. and Kokolakis, S. (2005) 'Information systems security from a knowledge management perspective', Information Management & Computer Security, Vol. 13, No. 3, pp.189-202.
    • (2005) Information Management & Computer Security , vol.13 , Issue.3 , pp. 189-202
    • Belsis, P.1    Kokolakis, S.2
  • 8
    • 47049094725 scopus 로고    scopus 로고
    • Information security management - Part 2: Specification for information security management systems
    • BSI , London, British Standards Institute
    • BSI (2002) 'Information security management - Part 2: Specification for information security management systems', BS 7799-2: 2002, London, British Standards Institute.
    • (2002) BS 7799-2: 2002
  • 9
    • 18144368967 scopus 로고    scopus 로고
    • Knowledge management science-not rocket science
    • Call, D. (2005) 'Knowledge management science-not rocket science', Journal of Management Science, Vol. 9, No. 2, pp.19-30.
    • (2005) Journal of Management Science , vol.9 , Issue.2 , pp. 19-30
    • Call, D.1
  • 10
    • 0029506317 scopus 로고
    • Ethics and information technology use: A factor analysis of attitudes to computer use
    • Conger, S., Loch, K.D. and Helft, B.L. (1995) 'Ethics and information technology use: A factor analysis of attitudes to computer use', Information Systems Journal, Vol. 6, No. 4, pp.161-184.
    • (1995) Information Systems Journal , vol.6 , Issue.4 , pp. 161-184
    • Conger, S.1    Loch, K.D.2    Helft, B.L.3
  • 11
    • 0004040956 scopus 로고
    • Milton Keynes: Open University Press
    • Croall, H. (1992) White-collar Crime, Milton Keynes: Open University Press.
    • (1992) White-collar Crime
    • Croall, H.1
  • 21
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Toward socio-organisational perspectives
    • Dhillon, G. and Backhouse, J. (2001) 'Current directions in IS security research: Toward socio-organisational perspectives', Information Systems Journal, Vol. 11, No. 2, pp.127-153.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 28
    • 47049121726 scopus 로고    scopus 로고
    • Halliday, J. and von Solms, R. (1997) 'Effective information security policies', Information Technology on the Move, v. Solms, Port Elizabeth, Port Elizabeth Technikon, pp.12-20.
    • Halliday, J. and von Solms, R. (1997) 'Effective information security policies', Information Technology on the Move, v. Solms, Port Elizabeth, Port Elizabeth Technikon, pp.12-20.
  • 29
    • 1242308738 scopus 로고
    • Computer crime and abuse by IS employees: Something to worry about?
    • Harrington, S.J. (1995) 'Computer crime and abuse by IS employees: something to worry about?', Journal of Systems Management, Vol. 46, No. 2, pp.6-11.
    • (1995) Journal of Systems Management , vol.46 , Issue.2 , pp. 6-11
    • Harrington, S.J.1
  • 30
    • 0032620195 scopus 로고    scopus 로고
    • Identifying and controlling computer crime and employee fraud
    • Haugen, S. and Selin, J.R. (1999) 'Identifying and controlling computer crime and employee fraud', Industrial Management & Data Systems, Vol. 99, No. 8, pp.340-344.
    • (1999) Industrial Management & Data Systems , vol.99 , Issue.8 , pp. 340-344
    • Haugen, S.1    Selin, J.R.2
  • 31
    • 0037228072 scopus 로고    scopus 로고
    • The law, cybercrime, risk assessment and cyber protection
    • Hinde, S. (2003) 'The law, cybercrime, risk assessment and cyber protection', Computers and Security, Vol. 22, No. 2, pp.90-95.
    • (2003) Computers and Security , vol.22 , Issue.2 , pp. 90-95
    • Hinde, S.1
  • 32
    • 0011432676 scopus 로고
    • Deficiencies of the traditional approach to information security and the requirement for a new methodology
    • Hitchings, J. (1995) 'Deficiencies of the traditional approach to information security and the requirement for a new methodology', Computers & Security, Vol. 14, No. 5, pp.377-383.
    • (1995) Computers & Security , vol.14 , Issue.5 , pp. 377-383
    • Hitchings, J.1
  • 33
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes?
    • Hoffer, J.A. and Straub, D.W. (1989) 'The 9 to 5 underground: Are you policing computer crimes?', Sloan Management Review, Vol. 30, No. 4, pp.35-44.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-44
    • Hoffer, J.A.1    Straub, D.W.2
  • 34
    • 84994768852 scopus 로고    scopus 로고
    • Managing information systems security: A soft approach
    • Cleveland, Ohio, USA, 16-18 December
    • James, H. (1996) 'Managing information systems security: A soft approach', International Conference for Information Systems (ICIS) Cleveland, Ohio, USA, 16-18 December.
    • (1996) International Conference for Information Systems (ICIS)
    • James, H.1
  • 35
    • 84976680568 scopus 로고
    • Accountability and computer decision systems
    • Johnson, D.G. and Mulvey, J.M. (1995) 'Accountability and computer decision systems', Communications of the ACM, Vol. 38, No. 12, pp.58-64.
    • (1995) Communications of the ACM , vol.38 , Issue.12 , pp. 58-64
    • Johnson, D.G.1    Mulvey, J.M.2
  • 38
    • 84976745037 scopus 로고
    • Ethical concepts and information technology
    • Laudon, K.C. (1995) 'Ethical concepts and information technology', Communications of the ACM, Vol. 38, No. 12, pp.33-39.
    • (1995) Communications of the ACM , vol.38 , Issue.12 , pp. 33-39
    • Laudon, K.C.1
  • 40
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of IT misuse
    • Magklaras, G.B. and Furnell, S.M. (2003) 'Insider threat prediction tool: Evaluating the probability of IT misuse', Computers & Security Vol. 21, No. 1, pp.62-73.
    • (2003) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 42
    • 0036535306 scopus 로고    scopus 로고
    • The persistence of knowledge-based advantage: An empirical test for product performance and technological knowledge
    • McEvily, S.K. and Chakravarthy, B. (2002) 'The persistence of knowledge-based advantage: An empirical test for product performance and technological knowledge', Strategic Management Journal, Vol. 23, pp.285-305.
    • (2002) Strategic Management Journal , vol.23 , pp. 285-305
    • McEvily, S.K.1    Chakravarthy, B.2
  • 45
    • 0022298184 scopus 로고
    • Strategy formation in an adhocracy
    • Mintzberg, H. and McHugh, A. (1985) 'Strategy formation in an adhocracy', Administration Sciences, Vol. 30, No. 2, pp.160-197.
    • (1985) Administration Sciences , vol.30 , Issue.2 , pp. 160-197
    • Mintzberg, H.1    McHugh, A.2
  • 50
    • 85071808588 scopus 로고    scopus 로고
    • The tacit dimension
    • L. Prusak Ed, Boston, MA: Butterworth-Heinemann, pp
    • Polanyi, M. (1997) 'The tacit dimension', in L. Prusak (Ed.) Knowledge in Organizations, Boston, MA: Butterworth-Heinemann, pp.135-146.
    • (1997) Knowledge in Organizations , pp. 135-146
    • Polanyi, M.1
  • 51
    • 47049098580 scopus 로고    scopus 로고
    • Price Waterhouse Report (1995) 'Baring futures (Singapore) Pte Ltd: investigation pursuant to Section 231 of the Companies Act (Chapter 50)', in C.S.M. Lim and N.K.N. Tan (Eds.) The Report of the Inspectors from Price Waterhouse Appointed by the Minister of Finance September.
    • Price Waterhouse Report (1995) 'Baring futures (Singapore) Pte Ltd: investigation pursuant to Section 231 of the Companies Act (Chapter 50)', in C.S.M. Lim and N.K.N. Tan (Eds.) The Report of the Inspectors from Price Waterhouse Appointed by the Minister of Finance September.
  • 52
    • 33745810594 scopus 로고    scopus 로고
    • Knowledge management: Securing the future
    • Randeree, E. (2006) 'Knowledge management: Securing the future', Journal of Knowledge Management, Vol. 10, No. 4, pp.145-156.
    • (2006) Journal of Knowledge Management , vol.10 , Issue.4 , pp. 145-156
    • Randeree, E.1
  • 54
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E.E. (2002) 'A framework for understanding and predicting insider attacks', Computers & Security, Vol. 21, No. 6, pp.526-531.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 56
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M.T. (2000) 'A conceptual foundation for organizational information security awareness', Information Management & Computer Security, Vol. 8, No. 1, pp.31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 57
    • 0011644488 scopus 로고    scopus 로고
    • An analysis of the recent IS security development approaches: Descriptive and prescriptive implications
    • G. Dhillon Ed, Hershey: Idea Group Publishing, pp
    • Siponen, M.T. (2001) 'An analysis of the recent IS security development approaches: Descriptive and prescriptive implications', in G. Dhillon (Ed.) Information Security Management: Global Challenges in the New Millennium, Hershey: Idea Group Publishing, pp.125-134.
    • (2001) Information Security Management: Global Challenges in the New Millennium , pp. 125-134
    • Siponen, M.T.1
  • 59
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D.W. (1990) 'Effective IS security: An empirical study', Information System Research, Vol. 1, No. 2, pp.255-277.
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 60
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risks: Security planning models for management decision making
    • Straub, D.W. and Welke, R.J. (1998) 'Coping with systems risks: Security planning models for management decision making', MIS Quarterly, Vol. 22, No. 4, pp.441-464.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 61
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, M.E. and von Solms, R. (1998) 'Information security awareness: educating your users effectively', Information Management & Computer Security, Vol. 6, No. 4, pp.167-173.
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    von Solms, R.2
  • 62
    • 0011586156 scopus 로고    scopus 로고
    • Why information security is so important
    • Von Solms, R. (1998) 'Why information security is so important', Information Security Management, Vol. 6, No. 5, pp.224-225.
    • (1998) Information Security Management , vol.6 , Issue.5 , pp. 224-225
    • Von Solms, R.1
  • 63
    • 0039639238 scopus 로고
    • Organizational computer security policy: The reality
    • Warman, A.R. (1992) 'Organizational computer security policy: The reality', European Journal of Information Systems, Vol. 1, No. 5, pp.305-310.
    • (1992) European Journal of Information Systems , vol.1 , Issue.5 , pp. 305-310
    • Warman, A.R.1
  • 65
    • 0011596524 scopus 로고
    • Knowledge and the speed of the transfer and imitation of organizational capabilities: An empirical test
    • Zander, U. and Kogut, B. (1995) 'Knowledge and the speed of the transfer and imitation of organizational capabilities: An empirical test', Organisation Science, Vol. 6, pp.76-92.
    • (1995) Organisation Science , vol.6 , pp. 76-92
    • Zander, U.1    Kogut, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.