메뉴 건너뛰기




Volumn 52, Issue 1, 2009, Pages 92-100

The impact of information richness on information security awareness training effectiveness

Author keywords

Hypermedia; Hypertext; Information richness; Information security; Multimedia; Security awareness

Indexed keywords

HYPERTEXT SYSTEMS; TEXT PROCESSING;

EID: 56249140028     PISSN: 03601315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compedu.2008.06.011     Document Type: Article
Times cited : (207)

References (34)
  • 4
    • 56249148616 scopus 로고    scopus 로고
    • Claburn, T. (2005). Machine wars: The battle between good and evil in cyberspace is increasingly fought with automated tools. Information Week, January 17, pp. 54-63.
    • Claburn, T. (2005). Machine wars: The battle between good and evil in cyberspace is increasingly fought with automated tools. Information Week, January 17, pp. 54-63.
  • 6
    • 0029004440 scopus 로고
    • Toward a theory of situation awareness in dynamic systems
    • Endsley M.R. Toward a theory of situation awareness in dynamic systems. Human Factors Journal 37 1 (1995) 32-64
    • (1995) Human Factors Journal , vol.37 , Issue.1 , pp. 32-64
    • Endsley, M.R.1
  • 7
    • 56249129381 scopus 로고    scopus 로고
    • Endsley M.R., and Garland D.J. (Eds), Lawrence Erlbrum Associates, Mahwah, NJ
    • In: Endsley M.R., and Garland D.J. (Eds). Theoretical underpinnings of situation awareness: A critical review. Situational analysis awareness and measurement (2000), Lawrence Erlbrum Associates, Mahwah, NJ
    • (2000) Situational analysis awareness and measurement
  • 8
    • 33748513056 scopus 로고    scopus 로고
    • A comparison between concept maps, mind, maps conceptual diagrams, and visual metaphors as complementary tools for knowledge construction and sharing
    • Eppler M.J. A comparison between concept maps, mind, maps conceptual diagrams, and visual metaphors as complementary tools for knowledge construction and sharing. Information Visualization 5 3 (2006) 202
    • (2006) Information Visualization , vol.5 , Issue.3 , pp. 202
    • Eppler, M.J.1
  • 11
    • 56249138376 scopus 로고
    • Security awareness and the persuasion of managers
    • Highland H.J. Security awareness and the persuasion of managers. Computers & Security 14 1 (1995) 27
    • (1995) Computers & Security , vol.14 , Issue.1 , pp. 27
    • Highland, H.J.1
  • 12
    • 84992897913 scopus 로고    scopus 로고
    • Ten pointers for enhancing learners' motivation
    • Huang L. Ten pointers for enhancing learners' motivation. Business Communication Quarterly, New York 66 4 (2003) 88-95
    • (2003) Business Communication Quarterly, New York , vol.66 , Issue.4 , pp. 88-95
    • Huang, L.1
  • 13
    • 33751161222 scopus 로고    scopus 로고
    • A longitudinal study of information system threat categories: the enduring problem of human error
    • Im J.J., and L Baskerville R. A longitudinal study of information system threat categories: the enduring problem of human error. Database for Advances in Information Systems 36 4 (2005) 68-79
    • (2005) Database for Advances in Information Systems , vol.36 , Issue.4 , pp. 68-79
    • Im, J.J.1    L Baskerville, R.2
  • 16
    • 0034144894 scopus 로고    scopus 로고
    • Incorporating learner experience into the design of multimedia instruction
    • Kalyuga S., Chandler P., and Sweller J. Incorporating learner experience into the design of multimedia instruction. Journal of Educational Psychology 92 (2000) 126-136
    • (2000) Journal of Educational Psychology , Issue.92 , pp. 126-136
    • Kalyuga, S.1    Chandler, P.2    Sweller, J.3
  • 17
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • Kruger H.A., and Kearney W.D. A prototype for assessing information security awareness. Computers & Security 25 4 (2006) 289-296
    • (2006) Computers & Security , vol.25 , Issue.4 , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 19
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • Leach J. Improving user security behaviour. Computers & Security 22 8 (2003) 685-692
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 20
    • 39749093168 scopus 로고
    • The magical number seven, plus or minus two: some limits on our capacity for processing information
    • Miller G.A. The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychological Review 63 (1956) 81-97
    • (1956) Psychological Review , Issue.63 , pp. 81-97
    • Miller, G.A.1
  • 22
    • 56249144585 scopus 로고    scopus 로고
    • NIST SP 800-50 (2003). National Institute of Standards and Technology (NIST). Building an information technology security awareness and training program (NIST SP 800-50). Washington, DC: US Department of Commerce.
    • NIST SP 800-50 (2003). National Institute of Standards and Technology (NIST). Building an information technology security awareness and training program (NIST SP 800-50). Washington, DC: US Department of Commerce.
  • 23
    • 56249131203 scopus 로고    scopus 로고
    • NIST SP 800-16 (1998). National Institute of Standards and Technology (NIST) information technology training requirements: A role- and performance-based model (NIST Special Publication 800-16). Washington, DC: US Department of Commerce.
    • NIST SP 800-16 (1998). National Institute of Standards and Technology (NIST) information technology training requirements: A role- and performance-based model (NIST Special Publication 800-16). Washington, DC: US Department of Commerce.
  • 24
    • 56249136028 scopus 로고    scopus 로고
    • Nielsen, J. (2000). Hard-to-use sites will fail. The Irish Times, January 2000.
    • Nielsen, J. (2000). Hard-to-use sites will fail. The Irish Times, January 2000.
  • 25
    • 0002914557 scopus 로고
    • Concept maps and Vee diagrams: Two metacognitive tools for science and mathematics education
    • Novak J.D. Concept maps and Vee diagrams: Two metacognitive tools for science and mathematics education. Instructional Science 19 (1990) 29-52
    • (1990) Instructional Science , Issue.19 , pp. 29-52
    • Novak, J.D.1
  • 26
    • 33744544943 scopus 로고    scopus 로고
    • Case study: A bold new approach to awareness and education, and how it met an ignoble fate
    • Power R., and Forte D. Case study: A bold new approach to awareness and education, and how it met an ignoble fate. Computer Fraud & Security 5 (2006) 7-10
    • (2006) Computer Fraud & Security , Issue.5 , pp. 7-10
    • Power, R.1    Forte, D.2
  • 27
    • 33745176081 scopus 로고    scopus 로고
    • Contextual information access and storytelling in mixed reality using hypermedia
    • Romero L., Santiago J., and Correia N. Contextual information access and storytelling in mixed reality using hypermedia. Computers in Entertainment, New York 2 3 (2004)
    • (2004) Computers in Entertainment, New York , vol.2 , Issue.3
    • Romero, L.1    Santiago, J.2    Correia, N.3
  • 28
    • 56249114939 scopus 로고    scopus 로고
    • Schlienger, T., & Teufel, S. (2003). Information security culture - From analysis to change. In 3rd annual information security South Africa conference, 9-11 July 2003, information security South Africa - Proceedings of ISSA 2003, Johannesburg, South Africa.
    • Schlienger, T., & Teufel, S. (2003). Information security culture - From analysis to change. In 3rd annual information security South Africa conference, 9-11 July 2003, information security South Africa - Proceedings of ISSA 2003, Johannesburg, South Africa.
  • 29
    • 56249085342 scopus 로고    scopus 로고
    • Schneider, E. C., & Therkalsen, G. W. (1990). How secure are your system? Avenues to Automation, November 1990, pp. 68-72.
    • Schneider, E. C., & Therkalsen, G. W. (1990). How secure are your system? Avenues to Automation, November 1990, pp. 68-72.
  • 31
    • 0009034712 scopus 로고    scopus 로고
    • Misleading theoretical assumptions in hypertext/hypermedia research
    • Tergan S. Misleading theoretical assumptions in hypertext/hypermedia research. Journal of Educational Multimedia and Hypermedia 6 (1997) 257-283
    • (1997) Journal of Educational Multimedia and Hypermedia , Issue.6 , pp. 257-283
    • Tergan, S.1
  • 32
    • 33745500491 scopus 로고    scopus 로고
    • Enhancing the employee security awareness model
    • Valentine J.A. Enhancing the employee security awareness model. Computer Fraud & Security 6 (2006) 17-19
    • (2006) Computer Fraud & Security , Issue.6 , pp. 17-19
    • Valentine, J.A.1
  • 33
    • 56249102173 scopus 로고    scopus 로고
    • Wilson, M., & Hash, J. (2003). Build awareness and training program. National Institute of Standards and Technology (NIST).
    • Wilson, M., & Hash, J. (2003). Build awareness and training program. National Institute of Standards and Technology (NIST).
  • 34
    • 56249100789 scopus 로고    scopus 로고
    • Wireless News "Cisco Study: Despite Claiming Security Awareness, Many Remote Workers Engage in Risky Online Behavior" (2006). Wireless News, October 10, p. 1.
    • Wireless News "Cisco Study: Despite Claiming Security Awareness, Many Remote Workers Engage in Risky Online Behavior" (2006). Wireless News, October 10, p. 1.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.