메뉴 건너뛰기




Volumn , Issue , 2008, Pages 3639-3644

Human, organizational, and technological factors of IT security

Author keywords

Human factors; IT security; Organizational factors; Qualitative research; Technological factors

Indexed keywords

HUMAN ENGINEERING; INDUSTRIAL MANAGEMENT; PROJECT MANAGEMENT; SECURITY SYSTEMS;

EID: 57049127094     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1358628.1358905     Document Type: Conference Paper
Times cited : (25)

References (15)
  • 2
    • 0035341601 scopus 로고    scopus 로고
    • Error and distributed cognition in design
    • Busby, J.S., Error and distributed cognition in design. Design Studies, (2001). 22: 233-254.
    • (2001) Design Studies , vol.22 , pp. 233-254
    • Busby, J.S.1
  • 3
    • 59649086633 scopus 로고    scopus 로고
    • Flechais, I. and Sasse, M.A., Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. Int. J. Human-Computer Studies, (2007): doi:10.1016/j.ijhcs.2007.10.002.
    • Flechais, I. and Sasse, M.A., Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. Int. J. Human-Computer Studies, (2007): doi:10.1016/j.ijhcs.2007.10.002.
  • 5
    • 35348877203 scopus 로고    scopus 로고
    • Security administration tools and practices
    • L. F. Cranor and Garfinkel, S, Editors, O'Reilly Media, Inc, Sebastapol
    • Kandogan, E. and Haber, E.M., Security administration tools and practices., in Security and Usability: Designing Secure Systems that People Can Use, L. F. Cranor and Garfinkel, S., Editors. 2005, O'Reilly Media, Inc.: Sebastapol. 357-378.
    • (2005) Security and Usability: Designing Secure Systems that People Can Use , pp. 357-378
    • Kandogan, E.1    Haber, E.M.2
  • 7
    • 57049154398 scopus 로고    scopus 로고
    • Killcrece, G., Kossakowski, K.P., Ruefle, R., and Zajicek, M., Organizational models for computer security incident response teams (CSIRTS). (2003): CMU/SEI-2003-HB-001 ADA421684: http://www.sei.cmu.edu/ publications/documents/03.reports/03hb001.html.
    • Killcrece, G., Kossakowski, K.P., Ruefle, R., and Zajicek, M., Organizational models for computer security incident response teams (CSIRTS). (2003): CMU/SEI-2003-HB-001 ADA421684: http://www.sei.cmu.edu/ publications/documents/03.reports/03hb001.html.
  • 10
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic, A.G. and Clark, J.G., Why there aren't more information security research studies. Information & Management, (2004). 41(5): 597-607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 11
    • 0036532101 scopus 로고    scopus 로고
    • An empirical study of industrial security-engineering practices
    • Rayford, R.H., B. Vaughn, J., and Fox, K., An empirical study of industrial security-engineering practices. J. of Systems and Software, (2001). 61: 225-232.
    • (2001) J. of Systems and Software , vol.61 , pp. 225-232
    • Rayford, R.H.B.1    Vaughn, J.2    Fox, K.3
  • 12
    • 57049138079 scopus 로고    scopus 로고
    • Redish, J., Expanding usability testing to evaluate complex systems. J. Of Usability Studies, (2007). 2(3): 102-111.
    • Redish, J., Expanding usability testing to evaluate complex systems. J. Of Usability Studies, (2007). 2(3): 102-111.
  • 13
    • 33646685242 scopus 로고    scopus 로고
    • IT Security: Protecting Organizations in Spite of Themselves
    • Siegel, D.A., Reid, B., and Dray, S.M., IT Security: Protecting Organizations in Spite of Themselves. Interactions, (2006). 13(3): 20-27.
    • (2006) Interactions , vol.13 , Issue.3 , pp. 20-27
    • Siegel, D.A.1    Reid, B.2    Dray, S.M.3
  • 15
    • 57049119995 scopus 로고    scopus 로고
    • Werlinger, R., Hawkey, K., and Beznosov, K. Security Practitioners in Context: Their Activities and Interactions. Proc. of Ext. Abstracts of CHI 2008. ACM. (In press).
    • Werlinger, R., Hawkey, K., and Beznosov, K. Security Practitioners in Context: Their Activities and Interactions. Proc. of Ext. Abstracts of CHI 2008. ACM. (In press).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.