메뉴 건너뛰기




Volumn 16, Issue 4, 2008, Pages 377-397

Implementation and effectiveness of organizational information security measures

Author keywords

Data security; Norway; Organizations

Indexed keywords

KETONES; SECURITY SYSTEMS;

EID: 54949146918     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220810908796     Document Type: Article
Times cited : (120)

References (50)
  • 1
    • 34249871944 scopus 로고    scopus 로고
    • "A qualitative study of users' view on information security"
    • Albrechtsen, E. (2007), "A qualitative study of users' view on information security", Computers & Security, Vol. 26 No. 4, pp. 276-89.
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 2
    • 54949083705 scopus 로고    scopus 로고
    • "Gammeldags tenkning i moderne organisasjoner? Om IKT-sikkerhet i kunnskapsorganisasjoner"
    • in Lydersen, S. (Ed.) Tapir Akademisk, Trondheim (in Norwegian)
    • Albrechtsen, E. and Grøtan, T.O. (2004), "Gammeldags tenkning i moderne organisasjoner? Om IKT-sikkerhet i kunnskapsorganisasjoner" ("Old-fashioned thinking in modern organizations? On ICT-security in knowledge organizations)", in Lydersen, S. (Ed.), Fra flis I fingeren til ragnarokk, Tapir Akademisk, Trondheim, pp. 335-55 (in Norwegian).
    • (2004) Fra Flis I Fingeren Til Ragnarokk , pp. 335-355
    • Albrechtsen, E.1    Grøtan, T.O.2
  • 4
    • 56149122731 scopus 로고    scopus 로고
    • "Industrial safety management and information security management: Risk characteristics and management approaches"
    • Albrechtsen, E. and Hovden, J. (2007b), "Industrial safety management and information security management: Risk characteristics and management approaches", The Proceedings of ESREL2007.
    • (2007) The Proceedings of ESREL2007
    • Albrechtsen, E.1    Hovden, J.2
  • 5
    • 54949149369 scopus 로고    scopus 로고
    • "Information security digital divide in organizations: Information security managers versus users"
    • (unpublished) manuscript submitted to Computers & Security
    • Albrechtsen, E. and Hovden, J. (unpublished), "Information security digital divide in organizations: Information security managers versus users", manuscript submitted to Computers & Security.
    • Albrechtsen, E.1    Hovden, J.2
  • 6
    • 16444374009 scopus 로고    scopus 로고
    • "The two sides of ROI: Return on investment vs risk of incarceration"
    • Berghel, H. (2005), "The two sides of ROI: Return on investment vs risk of incarceration", Communications of the ACM, Vol. 48 No. 4, pp. 15-20.
    • (2005) Communications of the ACM , vol.48 , Issue.4 , pp. 15-20
    • Berghel, H.1
  • 9
    • 54949152120 scopus 로고    scopus 로고
    • BSI, Bundesamt für Sicherheit in der Informationstechnik IT Baseline Protection in brief
    • BSI, Bundesamt für Sicherheit in der Informationstechnik (2004), IT Security Guidelines, IT Baseline Protection in brief.
    • (2004) IT Security Guidelines
  • 10
    • 54949097194 scopus 로고    scopus 로고
    • Congressional Research Service Report for Congress, available at
    • Cashell, B., Jackson, W., Jickling, M. and Webl, B. (2004), "The economic impact of cyber attacks", Congressional Research Service Report for Congress, available at: www.cisco.com/warp/public/779/ govtaffairs/images/CRS_Cyber_Attacks.pdf.
    • (2004) "The Economic Impact of Cyber Attacks"
    • Cashell, B.1    Jackson, W.2    Jickling, M.3    Webl, B.4
  • 11
    • 23044525969 scopus 로고    scopus 로고
    • "Current directions in IS security research: Towards socio-organizational perspectives"
    • Dhillon, G. and Backhose, J. (2001), "Current directions in IS security research: Towards socio-organizational perspectives", Information Systems Journal, Vol. 11 No. 2, pp. 127-53.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhose, J.2
  • 12
    • 32444443168 scopus 로고    scopus 로고
    • "Aligning the information security policy with the strategic information systems plan"
    • Doherty, N.F. and Fulford, H. (2006), "Aligning the information security policy with the strategic information systems plan", Computers & Security, Vol. 25 No. 1, pp. 55-63.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 55-63
    • Doherty, N.F.1    Fulford, H.2
  • 13
    • 0006607828 scopus 로고
    • "Scandinavian design: On participation and skill"
    • in Adler, P.S. and Winograd, T.A. (Eds) Oxford University Press, New York, NY
    • Ehn, P. (1992), "Scandinavian design: On participation and skill", in Adler, P.S. and Winograd, T.A. (Eds), Usability - Turning Technologies into Tools, Oxford University Press, New York, NY.
    • (1992) Usability - Turning Technologies Into Tools
    • Ehn, P.1
  • 15
    • 54949102996 scopus 로고    scopus 로고
    • "Evaluating applied information security measures: An analysis of the data from the Norwegian Computer Crime Survey 2006"
    • Hagen, J.M. (2007), "Evaluating applied information security measures: An analysis of the data from the Norwegian Computer Crime Survey 2006", FFI/REPORT-2007/02558, pp. 35-48.
    • (2007) FFI/REPORT-2007/02558 , pp. 35-48
    • Hagen, J.M.1
  • 16
    • 0034027568 scopus 로고    scopus 로고
    • "Culture's confusion"
    • Hale, A.R. (2000), "Culture's confusion", Safety Science, Vol. 34 Nos 1/3, pp. 1-4.
    • (2000) Safety Science , vol.34 , Issue.1-3 , pp. 1-4
    • Hale, A.R.1
  • 17
    • 0012284534 scopus 로고    scopus 로고
    • Hale, A.R. and Baram, M.S. (Eds) Pergamon, Oxford
    • Hale, A.R. and Baram, M.S. (Eds) (1998), Safety Management: The Challenge of Change, Pergamon, Oxford.
    • (1998) Safety Management: The Challenge of Change
  • 19
    • 0036330173 scopus 로고    scopus 로고
    • "Information security policy - What do international security standards say?"
    • Höne, K. and Eloff, J.H.P. (2002), "Information security policy - what do international security standards say?", Computers & Security, Vol. 21 No. 5, pp. 402-9.
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 402-409
    • Höne, K.1    Eloff, J.H.P.2
  • 23
    • 33644755338 scopus 로고    scopus 로고
    • "Awareness training, security awareness: Switch to a better programme"
    • Johnson, E. (2006), "Awareness training, security awareness: Switch to a better programme", Network Security, Vol. 2006 No. 2, pp. 15-18.
    • (2006) Network Security , vol.2006 , Issue.2 , pp. 15-18
    • Johnson, E.1
  • 24
    • 18844431067 scopus 로고    scopus 로고
    • "Information systems security policies: A contextual perspective"
    • Karyda, M., Kiountouzis, E. and Kokolakis, S. (2005), "Information systems security policies: A contextual perspective", Computers & Security, Vol. 24 No. 3, pp. 246-60.
    • (2005) Computers & Security , vol.24 , Issue.3 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 26
    • 24044451509 scopus 로고    scopus 로고
    • "Beyond trust: Security policies and defence in depth"
    • Kemp, M. (2005), "Beyond trust: Security policies and defence in depth", Network Security, Vol. 2005 No. 8, pp. 14-16.
    • (2005) Network Security , vol.2005 , Issue.8 , pp. 14-16
    • Kemp, M.1
  • 27
    • 1242263532 scopus 로고    scopus 로고
    • "Why there aren't more information security research studies"
    • Kotulic, A.G. and Clark, J. (2004), "Why there aren't more information security research studies", Information & Management, Vol. 41 No. 5, pp. 597-607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.2
  • 29
    • 38949205172 scopus 로고    scopus 로고
    • "The safety representative under pressure. A study of occupational health and safety management in the Norwegian oil and gas industry"
    • Lie, T., Hovden, J., Karlsen, J.E. and Alteren, B. (2008), "The safety representative under pressure. A study of occupational health and safety management in the Norwegian oil and gas industry", Safety Science, Vol. 46 No. 3.
    • (2008) Safety Science , vol.46 , Issue.3
    • Lie, T.1    Hovden, J.2    Karlsen, J.E.3    Alteren, B.4
  • 30
    • 54949096003 scopus 로고    scopus 로고
    • "Impact of legislation on information security management"
    • November/December
    • Lobree, B. (2002), "Impact of legislation on information security management", Security Management Practices, November/December, pp. 41-8.
    • (2002) Security Management Practices , pp. 41-48
    • Lobree, B.1
  • 31
    • 33746748784 scopus 로고    scopus 로고
    • "On incident handling and response: A state-of-the-art approach"
    • Mitropoulos, S., Patsos, D. and Douligeris, C. (2006), "On incident handling and response: A state-of-the-art approach", Computers & Security, Vol. 25 No. 5, pp. 351-70.
    • (2006) Computers & Security , vol.25 , Issue.5 , pp. 351-370
    • Mitropoulos, S.1    Patsos, D.2    Douligeris, C.3
  • 36
    • 0031279121 scopus 로고    scopus 로고
    • "Risk management in a dynamic society"
    • Rasmussen, J. (1997), "Risk management in a dynamic society", Safety Science, Vol. 27 Nos 2/3, pp. 183-213.
    • (1997) Safety Science , vol.27 , Issue.2-3 , pp. 183-213
    • Rasmussen, J.1
  • 40
    • 0033683516 scopus 로고    scopus 로고
    • "A conceptual foundation for organizational information security awareness"
    • Siponen, M. (2000), "A conceptual foundation for organizational information security awareness", Information Management and Computer security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management and Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 41
    • 85019433170 scopus 로고    scopus 로고
    • "A review of information security issues and respective research contributions"
    • Siponen, M.T. and Oinas-Kukkonen, H. (2007), "A review of information security issues and respective research contributions", The Database for Advances in Information Systems, Vol. 38 No. 1, pp. 60-81.
    • (2007) The Database for Advances in Information Systems , vol.38 , Issue.1 , pp. 60-81
    • Siponen, M.T.1    Oinas-Kukkonen, H.2
  • 42
    • 33644654426 scopus 로고    scopus 로고
    • "Information security and the law"
    • Sundt, C. (2006), "Information security and the law", Information Security Technical Report, Vol. 11 No. 1, pp. 2-9.
    • (2006) Information Security Technical Report , vol.11 , Issue.1 , pp. 2-9
    • Sundt, C.1
  • 43
    • 33744520370 scopus 로고    scopus 로고
    • "Towards an information security competence maturity model"
    • Thomson, K-L. and von Solms, R. (2006), "Towards an information security competence maturity model", Computer Fraud & Security, Vol. 2006 No. 5, pp. 11-15.
    • (2006) Computer Fraud & Security , vol.2006 , Issue.5 , pp. 11-15
    • Thomson, K.-L.1    von Solms, R.2
  • 44
    • 0033657872 scopus 로고    scopus 로고
    • "Information security - The third wave?"
    • Von Solms, B. (2000), "Information security - the third wave?", Computers & Security, Vol. 19 No. 7, pp. 615-20.
    • (2000) Computers & Security , vol.19 , Issue.7 , pp. 615-620
    • Von Solms, B.1
  • 45
    • 0034814690 scopus 로고    scopus 로고
    • "Information security - A multidimensional discipline"
    • Von Solms, B. (2001), "Information security - a multidimensional discipline", Computers & Security, Vol. 20 No. 6, pp. 501-8.
    • (2001) Computers & Security , vol.20 , Issue.6 , pp. 501-508
    • Von Solms, B.1
  • 46
    • 33747053670 scopus 로고    scopus 로고
    • "Information security - The fourth wave"
    • Von Solms, B. (2006), "Information security - the fourth wave", Computers & Security, Vol. 25 No. 3, pp. 165-8.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 165-168
    • Von Solms, B.1
  • 48
    • 0036299647 scopus 로고    scopus 로고
    • "The development of access control policies for information technology systems"
    • Ward, P. and Smith, C.L. (2002), "The development of access control policies for information technology systems", Computer & Security, Vol. 21 No. 4, pp. 365-71.
    • (2002) Computer & Security , vol.21 , Issue.4 , pp. 365-371
    • Ward, P.1    Smith, C.L.2
  • 49
    • 24644439555 scopus 로고    scopus 로고
    • "Information security policy's impact on reporting security incidents"
    • Wiant, T.L. (2005), "Information security policy's impact on reporting security incidents", Computers & Security, Vol. 24 No. 6, pp. 448-59.
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 448-459
    • Wiant, T.L.1
  • 50
    • 54949091017 scopus 로고    scopus 로고
    • "A framework for selection of methodology for risk and vulnerability assessments of infrastructures depending on ICT"
    • Wiencke, H.S., Aven, T. and Hagen, J. (2006), "A framework for selection of methodology for risk and vulnerability assessments of infrastructures depending on ICT", The Proceedings of ESREL2006.
    • (2006) The Proceedings of ESREL2006
    • Wiencke, H.S.1    Aven, T.2    Hagen, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.