메뉴 건너뛰기




Volumn 16, Issue 3, 2008, Pages 271-287

Process-variance models in information security awareness research

Author keywords

Data security; Information systems; Modelling; Organizational theory

Indexed keywords

DATA STRUCTURES; INFORMATION SERVICES; PROGRAMMING THEORY; STANDARDS; SURVEYS;

EID: 49249083704     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220810893216     Document Type: Review
Times cited : (18)

References (43)
  • 1
    • 0035638270 scopus 로고    scopus 로고
    • "Who wants to be an evolutionary theorist? Remarks on the occasion of the year 2000"
    • Aldrich, H.E. (2001), "Who wants to be an evolutionary theorist? Remarks on the occasion of the year 2000", OMT Distinguished Scholarly Career Award Presentation, Journal of Management Inquiry, Vol. 10, pp. 115-27.
    • (2001) Journal of Management Inquiry , vol.10 , pp. 115-127
    • Aldrich, H.E.1
  • 5
    • 3242808612 scopus 로고    scopus 로고
    • CSI/FBI Computer Security Institute, available at: (accessed February 20, 2007)
    • CSI/FBI (2005), Computer Crime and Security Survey 2005, Computer Security Institute, available at: www.cpppe.umd.edu/Bookstore/Documents/ 2005CSISurvey.pdf (accessed February 20, 2007).
    • (2005) Computer Crime and Security Survey 2005
  • 6
    • 33748435812 scopus 로고    scopus 로고
    • CSI/FBI Computer Security Institute, available at: (accessed March 15, 2007)
    • CSI/FBI (2006), Computer Crime and Security Survey 2006, Computer Security Institute, available at: Http://i.cmpnet.com/gocsi/db_area/pdfs/ fbi/FBI2006.pdf (accessed March 15, 2007).
    • (2006) Computer Crime and Security Survey 2006
  • 7
    • 49249116220 scopus 로고    scopus 로고
    • ENISA European Network and Information Security Agency, available at: (accessed February 20, 2007)
    • ENISA (2006), A Users' Guide: How to Raise Information Security Awareness, European Network and Information Security Agency, available at: www.enisa.europa.eu/doc/pdf/deliverables/ enisa_a_users_guide_how_to_raise_IS_awareness.pdf (accessed February 20, 2007).
    • (2006) A Users' Guide: How to Raise Information Security Awareness
  • 8
    • 49249113943 scopus 로고    scopus 로고
    • Ernst & Young Global Information Security Survey available at: (accessed February 20, 2007)
    • Ernst & Young Global Information Security Survey (2004), Annual Global Information Security Survey, Report, available at: www.ivpv.ugent.be/nl/opleidingen/aanbod/ictbeveiliging2005/ 2004_Global_Information_Security_Survey_2004.pdf (accessed February 20, 2007).
    • (2004) Annual Global Information Security Survey Report
  • 9
    • 84923430719 scopus 로고    scopus 로고
    • Ernst & Young Global Information Security Survey available at: (accessed February 20, 2007)
    • Ernst & Young Global Information Security Survey (2005), Annual Global Information Security Survey, Report, available at: www.vistorm.com/uplds/EY_Global_Information_Security_survey_20051.pdf (accessed February 20, 2007).
    • (2005) Annual Global Information Security Survey, Report
  • 10
    • 33644755338 scopus 로고    scopus 로고
    • "Security awareness: Switch to a better programme"
    • Everett, C.J. (2006), "Security awareness: Switch to a better programme", Network Security, No. 2, pp. 15-18.
    • (2006) Network Security , Issue.2 , pp. 15-18
    • Everett, C.J.1
  • 11
    • 33744784411 scopus 로고    scopus 로고
    • "Designing a security awareness program: Part I"
    • Hansche, S. (2001), "Designing a security awareness program: Part I", Information Systems Security, Vol. 9 No. 6, pp. 14-23.
    • (2001) Information Systems Security , vol.9 , Issue.6 , pp. 14-23
    • Hansche, S.1
  • 12
    • 0012954414 scopus 로고
    • "Models of change and information systems research"
    • in Nissen, H.E., Klein, H.K. and Hirschheim, R. (Eds), Elsevier Science Publishers, Amsterdam
    • Kaplan, B. (1991), "Models of change and information systems research", in Nissen, H.E., Klein, H.K. and Hirschheim, R. (Eds), Information Systems Research: Contemporary Approaches and Emergent Traditions, Elsevier Science Publishers, Amsterdam, pp. 593-611.
    • (1991) Information Systems Research: Contemporary Approaches and Emergent Traditions , pp. 593-611
    • Kaplan, B.1
  • 14
    • 49249103382 scopus 로고    scopus 로고
    • doctoral dissertation, University of South Africa, available at: (accessed February 20, 2007)
    • Kritzinger, E. (2006), "An information security retrieval and awareness model for industry", doctoral dissertation, University of South Africa, available at: Http://etd.unisa.ac.za/ETD-db/ETD-desc/ describe?urn=etd-11062006-094238 (accessed February 20, 2007).
    • (2006) "An Information Security Retrieval and Awareness Model for Industry"
    • Kritzinger, E.1
  • 15
    • 33746994612 scopus 로고    scopus 로고
    • "A prototype for assessing information security awareness"
    • Kruger, H.A. and Kearney, W.D. (2006), "A prototype for assessing information security awareness", Computers & Security, Vol. 25 No. 1, pp. 289-96.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 16
    • 0345764837 scopus 로고    scopus 로고
    • "Improving user security behavior"
    • Leach, J. (2003), "Improving user security behavior", Computers & Security, Vol. 22 No. 8, pp. 685-92.
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 17
    • 33845340126 scopus 로고    scopus 로고
    • "Grounded theory analysis of e-government initiatives: Exploring perceptions of government authorities"
    • Lee, J. and Kim, J. (2007), "Grounded theory analysis of e-government initiatives: Exploring perceptions of government authorities", Government Information Quarterly, Vol. 24 No. 1, pp. 135-47.
    • (2007) Government Information Quarterly , vol.24 , Issue.1 , pp. 135-147
    • Lee, J.1    Kim, J.2
  • 18
    • 22144444128 scopus 로고    scopus 로고
    • "Information systems for multinational enterprises - Some factors at work in their design and implementation"
    • Lehmann, H. and Gallupe, B. (2005), "Information systems for multinational enterprises - some factors at work in their design and implementation", Journal of International Management, Vol. 11 No. 2, pp. 163-86.
    • (2005) Journal of International Management , vol.11 , Issue.2 , pp. 163-186
    • Lehmann, H.1    Gallupe, B.2
  • 21
    • 84934933083 scopus 로고
    • "Information technology and organizational change: Causal structure in theory and research"
    • Markus, M.L. and Daniel, R. (1988), "Information technology and organizational change: Causal structure in theory and research", Management Science, Vol. 34 No. 5, pp. 583-98.
    • (1988) Management Science , vol.34 , Issue.5 , pp. 583-598
    • Markus, M.L.1    Daniel, R.2
  • 22
    • 45749094057 scopus 로고    scopus 로고
    • Master's thesis, NISlab Norwegian Information Security Laboratory, Campus IT University, available at: (accessed February 20, 2007)
    • Mathisen, J. (2004), "Measuring information security awareness - a survey showing the Norwegian way to do it", Master's thesis, NISlab Norwegian Information Security Laboratory, Campus IT University, available at: www.dsv.su.se/research/seclab/pages/msckththeses-en.html (accessed February 20, 2007).
    • (2004) "Measuring Information Security Awareness - A Survey Showing the Norwegian Way To Do It"
    • Mathisen, J.1
  • 24
    • 0038007944 scopus 로고    scopus 로고
    • "Re-examining fundamental GIS implementation constructs through a grounded theory approach"
    • Nasirin, S., Birks, D.F. and Jones, B. (2003), "Re-examining fundamental GIS implementation constructs through a grounded theory approach", Telematics and Informatics, Vol. 20 No. 4, pp. 331-47.
    • (2003) Telematics and Informatics , vol.20 , Issue.4 , pp. 331-347
    • Nasirin, S.1    Birks, D.F.2    Jones, B.3
  • 25
    • 1542493643 scopus 로고
    • "CASE tools as organizational change: Investigating incremental and radical changes in systems development"
    • Orlikowski, W. (1993), "CASE tools as organizational change: investigating incremental and radical changes in systems development", Management Information Systems Quarterly, Vol. 17 No. 3, pp. 309-40.
    • (1993) Management Information Systems Quarterly , vol.17 , Issue.3 , pp. 309-340
    • Orlikowski, W.1
  • 26
    • 84993099250 scopus 로고    scopus 로고
    • "Implementing an information security awareness program"
    • Peltier, T.R. (2005), "Implementing an information security awareness program", Information Systems Security, Vol. 14 No. 2, pp. 37-48.
    • (2005) Information Systems Security , vol.14 , Issue.2 , pp. 37-48
    • Peltier, T.R.1
  • 27
    • 0033246744 scopus 로고    scopus 로고
    • "Building process theory with narrative: From description to explanation"
    • Pentland, B.T. (1999), "Building process theory with narrative: from description to explanation", Academy of Management Review, Vol. 24 No. 4, pp. 711-24.
    • (1999) Academy of Management Review , vol.24 , Issue.4 , pp. 711-724
    • Pentland, B.T.1
  • 29
    • 49249131489 scopus 로고    scopus 로고
    • doctoral dissertation, Department of Information Processing Science, University of Oulu, available at: (accessed February 20, 2007)
    • Puhakainen, P. (2006), "A design theory for information security awareness", doctoral dissertation, Department of Information Processing Science, University of Oulu, available at: Http:// herkules.oulu.fi/isbn9514281144 (accessed February 20, 2007).
    • (2006) "A Design Theory for Information Security Awareness"
    • Puhakainen, P.1
  • 30
    • 21144465972 scopus 로고
    • "The organizational taxonomy: Definition and design"
    • Rich, P. (1992), "The organizational taxonomy: Definition and design", Academy of Management Review, Vol. 17 No. 4, pp. 758-81.
    • (1992) Academy of Management Review , vol.17 , Issue.4 , pp. 758-781
    • Rich, P.1
  • 31
    • 84905725481 scopus 로고    scopus 로고
    • Security Awareness Index Report ITToolBox and Pentasafe, available at: (accessed February 20, 2007)
    • Security Awareness Index Report (2002), "The state of security awareness among organizations worldwide", ITToolBox and Pentasafe, available at: Http://security.ittoolbox.com/pub/AM101502a.pdf (accessed February 20, 2007).
    • (2002) "The State of Security Awareness Among Organizations Worldwide"
  • 33
    • 0033683516 scopus 로고    scopus 로고
    • "A conceptual foundation for organizational information security awareness"
    • Siponen, T.M. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, T.M.1
  • 35
    • 0242453511 scopus 로고
    • "Promoting security awareness and commitment"
    • Spurling, P. (1995), "Promoting security awareness and commitment", Information Management & Computer Security, Vol. 3 No. 2, pp. 20-6.
    • (1995) Information Management & Computer Security , vol.3 , Issue.2 , pp. 20-26
    • Spurling, P.1
  • 39
    • 0242517401 scopus 로고    scopus 로고
    • "Information security awareness: Educating your users effectively"
    • Thomson, M.E. and von Solms, R. (1998), "Information security awareness: Educating your users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73.
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    von Solms, R.2
  • 41
    • 1142290930 scopus 로고    scopus 로고
    • "Event- and outcome-driven explanations of entrepreneurship"
    • van de Ven, A.H. and Engleman, R. (2004), "Event- and outcome-driven explanations of entrepreneurship", Journal of Business Venturing, Vol. 19, pp. 343-58.
    • (2004) Journal of Business Venturing , vol.19 , pp. 343-358
    • van de Ven, A.H.1    Engleman, R.2
  • 42
    • 21844497076 scopus 로고
    • "Explaining development and change in organizations"
    • van de Ven, A.H. and Poole, M.S. (1995), "Explaining development and change in organizations", Academy of Management Review, Vol. 20 No. 3, pp. 510-40.
    • (1995) Academy of Management Review , vol.20 , Issue.3 , pp. 510-540
    • van de Ven, A.H.1    Poole, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.