메뉴 건너뛰기




Volumn 27, Issue 7-8, 2008, Pages 241-253

Information security awareness in higher education: An exploratory study

Author keywords

Awareness; Conscientiousness; Higher Education; Human Factors; Information Security; UAE

Indexed keywords

HUMAN ENGINEERING;

EID: 55849105212     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.07.008     Document Type: Article
Times cited : (145)

References (69)
  • 1
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibility and security of information systems
    • Backhouse J., and Dhillon G. Structures of responsibility and security of information systems. European Journal of Information Systems 5 1 (1996) 2-9
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-9
    • Backhouse, J.1    Dhillon, G.2
  • 2
    • 0002520483 scopus 로고    scopus 로고
    • Modeling IT ethics: a study in situational ethics
    • Banerjee D., Cronan T.P., and Jones T.W. Modeling IT ethics: a study in situational ethics. MIS Quarterly 22 1 (1998) 31-60
    • (1998) MIS Quarterly , vol.22 , Issue.1 , pp. 31-60
    • Banerjee, D.1    Cronan, T.P.2    Jones, T.W.3
  • 4
    • 0001781217 scopus 로고
    • From human factors to human actors: the role of psychology and human-computer interaction studies in system design
    • Greenbaum J., and Kyng M. (Eds), Erlbaum, Hillsdale
    • Bannon L.J. From human factors to human actors: the role of psychology and human-computer interaction studies in system design. In: Greenbaum J., and Kyng M. (Eds). Design at work: cooperative design of computer systems (1991), Erlbaum, Hillsdale 25-44
    • (1991) Design at work: cooperative design of computer systems , pp. 25-44
    • Bannon, L.J.1
  • 5
    • 0013323252 scopus 로고    scopus 로고
    • Modern network complexity needs comprehensive security
    • Barsanti C. Modern network complexity needs comprehensive security. Security 36 7 (1999) 65-68
    • (1999) Security , vol.36 , Issue.7 , pp. 65-68
    • Barsanti, C.1
  • 6
    • 0013324190 scopus 로고
    • Risk analysis: an interpretive feasibility tool in justifying information systems security
    • Baskerville R. Risk analysis: an interpretive feasibility tool in justifying information systems security. European Journal of Information Systems 1 (1991) 121-130
    • (1991) European Journal of Information Systems , vol.1 , pp. 121-130
    • Baskerville, R.1
  • 7
    • 35348911095 scopus 로고
    • Security - a personnel issue. The importance of personnel attitudes and security education
    • Dittrich K., Rautakivi S., and Saari J. (Eds), Elsevier Science Publishers, Amsterdam
    • Beatson J.G. Security - a personnel issue. The importance of personnel attitudes and security education. In: Dittrich K., Rautakivi S., and Saari J. (Eds). Computer security and information integrity (1991), Elsevier Science Publishers, Amsterdam 29-38
    • (1991) Computer security and information integrity , pp. 29-38
    • Beatson, J.G.1
  • 8
    • 0000568440 scopus 로고
    • Case research in marketing: opportunities, problems, and a process
    • Bonoma T.V. Case research in marketing: opportunities, problems, and a process. Journal of Marketing Research 22 (1985) 199-208
    • (1985) Journal of Marketing Research , vol.22 , pp. 199-208
    • Bonoma, T.V.1
  • 9
    • 9744281201 scopus 로고    scopus 로고
    • Key issues in information systems management: 1994-95 SIM Delphi results
    • Brancheau J.C., Janz B.D., and Wetherbe J.C. Key issues in information systems management: 1994-95 SIM Delphi results. MIS Quarterly 20 2 (1996) 225-242
    • (1996) MIS Quarterly , vol.20 , Issue.2 , pp. 225-242
    • Brancheau, J.C.1    Janz, B.D.2    Wetherbe, J.C.3
  • 11
    • 33745903904 scopus 로고    scopus 로고
    • Piracy, computer crime, and IS misuse at the university
    • Cronan T.P., Foltz B., and Jones T.W. Piracy, computer crime, and IS misuse at the university. Communications of the ACM 49 6 (2006) 84-90
    • (2006) Communications of the ACM , vol.49 , Issue.6 , pp. 84-90
    • Cronan, T.P.1    Foltz, B.2    Jones, T.W.3
  • 15
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon G., and Backhouse J. Information system security management in the new millennium. Communications of the ACM 43 7 (2000) 125-128
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 16
    • 32144440693 scopus 로고    scopus 로고
    • Tasks for and tasks in human-computer interaction
    • Diaper D., and Sanger C. Tasks for and tasks in human-computer interaction. Interacting with Computers 18 2 (2006) 117-138
    • (2006) Interacting with Computers , vol.18 , Issue.2 , pp. 117-138
    • Diaper, D.1    Sanger, C.2
  • 18
    • 0343141389 scopus 로고    scopus 로고
    • Building social capital: the importance of entrepreneurial social infrastructure
    • Flora C. Building social capital: the importance of entrepreneurial social infrastructure. Rural Development News 21 2 (1997) 1-3
    • (1997) Rural Development News , vol.21 , Issue.2 , pp. 1-3
    • Flora, C.1
  • 19
  • 20
    • 0032032029 scopus 로고    scopus 로고
    • Installing an appropriate IS security policy in hospitals
    • Gaunt N. Installing an appropriate IS security policy in hospitals. International Journal of Medical Informatics 49 1 (1998) 131-134
    • (1998) International Journal of Medical Informatics , vol.49 , Issue.1 , pp. 131-134
    • Gaunt, N.1
  • 21
    • 0034318873 scopus 로고    scopus 로고
    • Practical approaches to creating a security culture
    • Gaunt N. Practical approaches to creating a security culture. International Journal of Medical Informatics 60 2 (2000) 151-157
    • (2000) International Journal of Medical Informatics , vol.60 , Issue.2 , pp. 151-157
    • Gaunt, N.1
  • 22
    • 0001823869 scopus 로고
    • Security concerns of system users: a study of perceptions of the adequacy of security
    • Goodhue D.L., and Straub D.W. Security concerns of system users: a study of perceptions of the adequacy of security. Information and Management 20 1 (1991) 13-27
    • (1991) Information and Management , vol.20 , Issue.1 , pp. 13-27
    • Goodhue, D.L.1    Straub, D.W.2
  • 23
    • 33744784411 scopus 로고    scopus 로고
    • Designing a security awareness program: part I
    • Hansche S. Designing a security awareness program: part I. Information System Security 10 1 (2001) 14-22
    • (2001) Information System Security , vol.10 , Issue.1 , pp. 14-22
    • Hansche, S.1
  • 24
    • 2542490783 scopus 로고    scopus 로고
    • Five personality dimensions and their influence on information behaviour
    • Heinström J. Five personality dimensions and their influence on information behaviour. Information Research 9 1 (2003) 165
    • (2003) Information Research , vol.9 , Issue.1 , pp. 165
    • Heinström, J.1
  • 25
    • 0036613095 scopus 로고    scopus 로고
    • What makes an effective information security policy?
    • Höne K., and Eloff J.H.P. What makes an effective information security policy?. Network Security 6 (2002) 14-16
    • (2002) Network Security , vol.6 , pp. 14-16
    • Höne, K.1    Eloff, J.H.P.2
  • 29
    • 1342323626 scopus 로고    scopus 로고
    • The evolution of user-centered focus in the human computer interaction field
    • Karat J., and Karat C.M. The evolution of user-centered focus in the human computer interaction field. IBM Systems Journal 42 4 (2003) 532-541
    • (2003) IBM Systems Journal , vol.42 , Issue.4 , pp. 532-541
    • Karat, J.1    Karat, C.M.2
  • 30
    • 0034316957 scopus 로고    scopus 로고
    • Health care management and information system security: awareness, training or education?
    • Katsikas S.K. Health care management and information system security: awareness, training or education?. International Journal of Medical Informatics 60 2 (2000) 129-135
    • (2000) International Journal of Medical Informatics , vol.60 , Issue.2 , pp. 129-135
    • Katsikas, S.K.1
  • 31
    • 34748909345 scopus 로고    scopus 로고
    • Katz, FH. The effect of a university information security survey on instructing methods in information security. In: Proceedings of the second annual conference on information security curriculum development; 2005. p. 43-8.
    • Katz, FH. The effect of a university information security survey on instructing methods in information security. In: Proceedings of the second annual conference on information security curriculum development; 2005. p. 43-8.
  • 32
    • 55849153197 scopus 로고
    • Security and confidentiality in a university computer network
    • New York, NY: ACM
    • Kerievsky B. Security and confidentiality in a university computer network. ACM SIGUCCS Newsletter Archive 6 3 (1976) 9-11 New York, NY: ACM
    • (1976) ACM SIGUCCS Newsletter Archive , vol.6 , Issue.3 , pp. 9-11
    • Kerievsky, B.1
  • 35
    • 55849147710 scopus 로고
    • Training as part of a security awareness program
    • Lafleur L.M. Training as part of a security awareness program. Computer Control Quarterly 10 4 (1992) 4-11
    • (1992) Computer Control Quarterly , vol.10 , Issue.4 , pp. 4-11
    • Lafleur, L.M.1
  • 36
    • 55849148738 scopus 로고    scopus 로고
    • The new learning curve: technological security
    • [accessed 20.06.08]
    • Marklein M.B. The new learning curve: technological security. USA Today (2006). http://www.usatoday.com/tech/news/computersecurity/hacking/2006-08-01-co llege-security_x.htm [accessed 20.06.08]
    • (2006) USA Today
    • Marklein, M.B.1
  • 37
    • 55849109287 scopus 로고    scopus 로고
    • Martins A, Eloff JHP. IS security Culture. Proceedings of IFIP TC-11 17th International Conference on IS security (SEC2002). 2002.
    • Martins A, Eloff JHP. IS security Culture. Proceedings of IFIP TC-11 17th International Conference on IS security (SEC2002). 2002.
  • 38
    • 55849101761 scopus 로고    scopus 로고
    • Marks A. Exploring universities' information systems security awareness in a changing higher education environment: a comparative case study research. PhD thesis, University of Salford; 2007.
    • Marks A. Exploring universities' information systems security awareness in a changing higher education environment: a comparative case study research. PhD thesis, University of Salford; 2007.
  • 43
    • 55849104907 scopus 로고    scopus 로고
    • Murray B. Running corporate and national security awareness programs. In: Proceedings of the IFIP TC11 seventh international conference on IS security 1991; p. 203-7.
    • Murray B. Running corporate and national security awareness programs. In: Proceedings of the IFIP TC11 seventh international conference on IS security 1991; p. 203-7.
  • 44
    • 34248324772 scopus 로고    scopus 로고
    • North MM, Roy G, North SM, Computer security ethics awareness in university environments: a challenge for management of information systems. In: Proceedings of the 44th annual southeast regional conference (ACMSE) 2006, Melbourne, Florida, March 10-12, p. 434-9.
    • North MM, Roy G, North SM, Computer security ethics awareness in university environments: a challenge for management of information systems. In: Proceedings of the 44th annual southeast regional conference (ACMSE) 2006, Melbourne, Florida, March 10-12, p. 434-9.
  • 45
    • 0028713556 scopus 로고
    • Development of security policies
    • Olnes J. Development of security policies. Computers and Security 13 8 (1994) 628-636
    • (1994) Computers and Security , vol.13 , Issue.8 , pp. 628-636
    • Olnes, J.1
  • 47
    • 0033321007 scopus 로고    scopus 로고
    • Security motivation, the mother of all controls, must precede awareness
    • Parker D.B. Security motivation, the mother of all controls, must precede awareness. Computer Security Journal 15 4 (1999) 15-23
    • (1999) Computer Security Journal , vol.15 , Issue.4 , pp. 15-23
    • Parker, D.B.1
  • 49
    • 55849088040 scopus 로고    scopus 로고
    • Security goes to school
    • Arlington
    • Piazza P. Security goes to school. Security Management 50 12 (2006) 46-51 Arlington
    • (2006) Security Management , vol.50 , Issue.12 , pp. 46-51
    • Piazza, P.1
  • 50
    • 55849113774 scopus 로고    scopus 로고
    • Puhakainen P, A design theory for information security awareness. PhD thesis, University of Oulu; 2006.
    • Puhakainen P, A design theory for information security awareness. PhD thesis, University of Oulu; 2006.
  • 51
    • 33846062455 scopus 로고    scopus 로고
    • Exploring virtual team-working effectiveness in the construction sector
    • Rezgui Y. Exploring virtual team-working effectiveness in the construction sector. Interacting with Computers 19 (2007) 96-112
    • (2007) Interacting with Computers , vol.19 , pp. 96-112
    • Rezgui, Y.1
  • 52
    • 55849147708 scopus 로고    scopus 로고
    • Ringing the alarm on campus computer security
    • Ronald R. Ringing the alarm on campus computer security. Black Issues in Higher Education 18 20 (2001) 50-51
    • (2001) Black Issues in Higher Education , vol.18 , Issue.20 , pp. 50-51
    • Ronald, R.1
  • 53
    • 2942738487 scopus 로고    scopus 로고
    • The McGraw-Hill Companies p. 444. ISBN-10: 0079137881; ISBN-13: 978-0079137883
    • Ross S.T. Unix systems security tools (1999), The McGraw-Hill Companies p. 444. ISBN-10: 0079137881; ISBN-13: 978-0079137883
    • (1999) Unix systems security tools
    • Ross, S.T.1
  • 54
    • 33747019602 scopus 로고    scopus 로고
    • Information security culture - from analysis to change
    • Schlienger T., and Teufel S. Information security culture - from analysis to change. South African Computer Journal 31 (2003) 46-52
    • (2003) South African Computer Journal , vol.31 , pp. 46-52
    • Schlienger, T.1    Teufel, S.2
  • 56
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen M.T. A conceptual foundation for organizational information security awareness. Information Management & Computer Security 8 1 (2000) 31-41
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 57
    • 53049103906 scopus 로고    scopus 로고
    • Five dimensions of information security awareness
    • Siponen M.T. Five dimensions of information security awareness. Computers and Society 31 2 (2001) 24-29
    • (2001) Computers and Society , vol.31 , Issue.2 , pp. 24-29
    • Siponen, M.T.1
  • 58
    • 33747194078 scopus 로고    scopus 로고
    • Information security standards focus on the existence of process, not its content
    • Siponen M. Information security standards focus on the existence of process, not its content. Communications of the ACM 49 8 (2006) 97-100
    • (2006) Communications of the ACM , vol.49 , Issue.8 , pp. 97-100
    • Siponen, M.1
  • 60
    • 0000280419 scopus 로고
    • Effective IS security: an empirical study
    • Straub D.W. Effective IS security: an empirical study. Information Systems Research 1 3 (1990) 255-276
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 61
    • 55849110091 scopus 로고
    • Uncovering and disciplining computer abuse: organizational responses and options
    • 0261-4103
    • Straub D.W., and Nance W.D. Uncovering and disciplining computer abuse: organizational responses and options. Information Age, 0261-4103 10 3 (1988) 151-156
    • (1988) Information Age , vol.10 , Issue.3 , pp. 151-156
    • Straub, D.W.1    Nance, W.D.2
  • 62
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: security planning models for management decision making
    • Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly 22 4 (1998) 441-469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 63
    • 55849114508 scopus 로고    scopus 로고
    • Tracy PD, Tracy MB, A conceptual framework of social capital and civil society: the re-emergence of John Dewey. In: Proceedings of the international research conference on social security, Helsinki; 2000, p. 2-15.
    • Tracy PD, Tracy MB, A conceptual framework of social capital and civil society: the re-emergence of John Dewey. In: Proceedings of the international research conference on social security, Helsinki; 2000, p. 2-15.
  • 66
    • 55849114507 scopus 로고    scopus 로고
    • Computers and network security in higher education
    • Updegrove D., and Wishon G. Computers and network security in higher education. EDUCAUSE (2003)
    • (2003) EDUCAUSE
    • Updegrove, D.1    Wishon, G.2
  • 67
    • 0013417739 scopus 로고    scopus 로고
    • Disaster recovery planning still lags
    • Verton D. Disaster recovery planning still lags. Computer World 36 14 (2002) 10
    • (2002) Computer World , vol.36 , Issue.14 , pp. 10
    • Verton, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.