메뉴 건너뛰기




Volumn , Issue , 2008, Pages 472-476

Investigation of stakeholders commitment to information security awareness programs

Author keywords

Human factor; IT security; Security; Security awareness training

Indexed keywords

ARSENIC COMPOUNDS; COMPUTER NETWORKS; HUMAN ENGINEERING; INDUSTRIAL MANAGEMENT; INDUSTRIAL RELATIONS;

EID: 51349093342     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISA.2008.25     Document Type: Conference Paper
Times cited : (11)

References (17)
  • 4
    • 51349112666 scopus 로고    scopus 로고
    • CIO Website. Accessed March 17, 2006
    • Passori, Al., 2005. Keeping an Eye on the Money Monster. CIO Website. Accessed March 17, 2006. http://www2.cio.com/analys/report255.html
    • (2005) Keeping an Eye on the Money Monster
    • Passori, A.1
  • 5
    • 51349096215 scopus 로고    scopus 로고
    • Australian Website. Accessed March 25
    • Bushell, Sue. 2006. Running on Luck. CIO Australian Website. Accessed March 25, 2006. http://www.cio.com.au/index.php/ id;221372330;fp;16;fpid;0
    • (2006) Running on Luck
    • Bushell, S.1
  • 6
    • 51349162339 scopus 로고    scopus 로고
    • Securing Your Organization, December 6-7
    • J. H. Abawajy, Securing Your Organization, ... December 6-7, 2007.
    • (2007)
    • Abawajy, J.H.1
  • 7
    • 0033683516 scopus 로고    scopus 로고
    • A conceptional foundation for organizational information security awareness
    • M. T. Siponen. A conceptional foundation for organizational information security awareness. InformationResources Management Journal, 8(1):31-41, 2000.
    • (2000) InformationResources Management Journal , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 9
    • 51349100066 scopus 로고    scopus 로고
    • Tune Your Wireless Security Measures
    • Davis, R. E. (2004). "Tune Your Wireless Security Measures." Credit Union Executive Newsletter 30(18): 2.
    • (2004) Credit Union Executive Newsletter , vol.30 , Issue.18 , pp. 2
    • Davis, R.E.1
  • 10
    • 36248967046 scopus 로고    scopus 로고
    • Siponen, M., Pahnila, S., and Mahmood, A., 2007, in IFIP International Federation for Information Processing, 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., (Boston: Springer), pp. 133-144.
    • Siponen, M., Pahnila, S., and Mahmood, A., 2007, in IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., (Boston: Springer), pp. 133-144.
  • 11
    • 23944439586 scopus 로고    scopus 로고
    • McCoy, C. and R. T. Fowler (2004). You are the key to security: establishing a successful security awareness program, http://doi.acm.org/10. 1145/1027802.1027882 Proceedings of the 32nd annual ACM SIGUCCS conference on User services Baltimore, MD, USA ACM: 346-349
    • McCoy, C. and R. T. Fowler (2004). You are the key to security: establishing a successful security awareness program, http://doi.acm.org/10. 1145/1027802.1027882 Proceedings of the 32nd annual ACM SIGUCCS conference on User services Baltimore, MD, USA ACM: 346-349
  • 12
    • 34748858580 scopus 로고    scopus 로고
    • Al-Hamdani, 2006 Al-Hamdani, W. A. (2006). Assessment of need and method of delivery for information security awareness program. Proceedings of the 3rd annual conference on Information security curriculum development. Kennesaw, Georgia, ACM Press: 102-108.
    • Al-Hamdani, 2006 Al-Hamdani, W. A. (2006). Assessment of need and method of delivery for information security awareness program. Proceedings of the 3rd annual conference on Information security curriculum development. Kennesaw, Georgia, ACM Press: 102-108.
  • 14
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • June
    • D. Straub. Effective is security: an empirical study. Information System Research, 1(2):255, June 1990.
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255
    • Straub, D.1
  • 15
    • 51349152525 scopus 로고    scopus 로고
    • Luis Navarro, Using industry best practices for effective security training, SC Megazine for IT Security Professionals, Jun 25 200
    • Luis Navarro, Using industry best practices for effective security training, SC Megazine for IT Security Professionals, Jun 25 200
  • 17
    • 51349144492 scopus 로고    scopus 로고
    • Donald L. Kirkpatrick, Evaluating training programs: The four levels, by (1994). San Francisco: Berrett-Koehler.
    • Donald L. Kirkpatrick, Evaluating training programs: The four levels, by (1994). San Francisco: Berrett-Koehler.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.