메뉴 건너뛰기




Volumn 13, Issue 4, 2008, Pages 207-215

In a 'trusting' environment, everyone is responsible for information security

Author keywords

Governance; Insider threats; Medical information security; Organisations; Security governance

Indexed keywords

BIOINFORMATICS; HEALTH RISKS;

EID: 57649095360     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2008.10.009     Document Type: Article
Times cited : (42)

References (53)
  • 1
    • 84936873422 scopus 로고    scopus 로고
    • Aagedal JØ, Braber FD, Dimitrakos T, Gran BA, Raptis D, Stölen K. Model-based risk assessment to improve enterprise security. In: Paper presented at the proceedings of the sixth international enterprise distributed object computing conference (EDOC'02); 2002.
    • Aagedal JØ, Braber FD, Dimitrakos T, Gran BA, Raptis D, Stölen K. Model-based risk assessment to improve enterprise security. In: Paper presented at the proceedings of the sixth international enterprise distributed object computing conference (EDOC'02); 2002.
  • 2
    • 57649086402 scopus 로고    scopus 로고
    • Anderson RH. Research and development initiatives focused on preventing, detecting, and responding to insider misuse of critical defense information systems. In: Paper presented at the results of a three-day workshop, RAND, Santa Monica, CA; 1999.
    • Anderson RH. Research and development initiatives focused on preventing, detecting, and responding to insider misuse of critical defense information systems. In: Paper presented at the results of a three-day workshop, RAND, Santa Monica, CA; 1999.
  • 3
    • 57649089077 scopus 로고    scopus 로고
    • Anderson RH, Bozek T, Longstaff T, Meitzer W, Skroch M, Van Wyk K. Research on mitigating the insider threat to information systems - #2. In: Proceedings of a Workshop, RAND, Santa Monica, CA; August 2000.
    • Anderson RH, Bozek T, Longstaff T, Meitzer W, Skroch M, Van Wyk K. Research on mitigating the insider threat to information systems - #2. In: Proceedings of a Workshop, RAND, Santa Monica, CA; August 2000.
  • 4
    • 0031611785 scopus 로고    scopus 로고
    • Developing a common nursing practice model
    • Bachman J.P., and Malloch K.M. Developing a common nursing practice model. Nursing Management 29 1 (1998) 26-27
    • (1998) Nursing Management , vol.29 , Issue.1 , pp. 26-27
    • Bachman, J.P.1    Malloch, K.M.2
  • 5
    • 57649096839 scopus 로고    scopus 로고
    • Barber B, Louwerse K, Davey J. White paper on health care information security. ISHTAR White Paper Retrieved 19 January 2006, 1998; Available from: .
    • Barber B, Louwerse K, Davey J. White paper on health care information security. ISHTAR White Paper Retrieved 19 January 2006, 1998; Available from: .
  • 6
    • 57649106701 scopus 로고    scopus 로고
    • BBC News. Nearly 100 medical records 'lost' journal, 2008; Retrieved from: .
    • BBC News. Nearly 100 medical records 'lost' journal, 2008; Retrieved from: .
  • 7
    • 33947705701 scopus 로고    scopus 로고
    • Information governance in NHS's NPfIT: a case for policy specification
    • Becker M.Y. Information governance in NHS's NPfIT: a case for policy specification. International Journal of Medical Informatics 76 5-6 (2007) 432-437
    • (2007) International Journal of Medical Informatics , vol.76 , Issue.5-6 , pp. 432-437
    • Becker, M.Y.1
  • 9
    • 0033191823 scopus 로고    scopus 로고
    • A relationship between computerisation and quality in general practice
    • Bolton P., Douglas K., Booth B., and Miller G. A relationship between computerisation and quality in general practice. Australian Family Physician 28 9 (1999) 962-965
    • (1999) Australian Family Physician , vol.28 , Issue.9 , pp. 962-965
    • Bolton, P.1    Douglas, K.2    Booth, B.3    Miller, G.4
  • 10
    • 57649096840 scopus 로고    scopus 로고
    • Business Software Alliance. Information security governance: toward a framework for action. Retrieved 03 July 2006, 2003; Available from: .
    • Business Software Alliance. Information security governance: toward a framework for action. Retrieved 03 July 2006, 2003; Available from: .
  • 11
    • 0032574158 scopus 로고    scopus 로고
    • Communication behaviours in a hospital setting: an observational study
    • Coiera E., and Tombs V. Communication behaviours in a hospital setting: an observational study. British Medical Journal 316 7132 (1998) 673-676
    • (1998) British Medical Journal , vol.316 , Issue.7132 , pp. 673-676
    • Coiera, E.1    Tombs, V.2
  • 12
    • 57649096842 scopus 로고
    • Medical decision making, clinical judgment, and decision analysis
    • Llewelyn H., and Hopkins A. (Eds), Royal College of Physicians of London, London
    • de Dombal T. Medical decision making, clinical judgment, and decision analysis. In: Llewelyn H., and Hopkins A. (Eds). Analysing how we reach clinical decisions (1993), Royal College of Physicians of London, London 1-5
    • (1993) Analysing how we reach clinical decisions , pp. 1-5
    • de Dombal, T.1
  • 13
    • 0035658603 scopus 로고    scopus 로고
    • Computer crimes: theorizing about the enemy within
    • Dhillon G., and Moores S. Computer crimes: theorizing about the enemy within. Computers and Security 20 8 (2001) 715-723
    • (2001) Computers and Security , vol.20 , Issue.8 , pp. 715-723
    • Dhillon, G.1    Moores, S.2
  • 14
    • 32444443168 scopus 로고    scopus 로고
    • Aligning the information security policy with the strategic information systems plan
    • Doherty N.F., and Fulford H. Aligning the information security policy with the strategic information systems plan. Computers and Security 25 1 (2006) 55-63
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 55-63
    • Doherty, N.F.1    Fulford, H.2
  • 15
    • 57649094079 scopus 로고    scopus 로고
    • erisk. Daiwa (case study). Retrieved 01 August 2008, 2001; Available from: .
    • erisk. Daiwa (case study). Retrieved 01 August 2008, 2001; Available from: .
  • 16
    • 57649110203 scopus 로고    scopus 로고
    • erisk. Barings (case study). Retrieved 01 August 2008, 2005; Available from: .
    • erisk. Barings (case study). Retrieved 01 August 2008, 2005; Available from: .
  • 17
    • 57649084502 scopus 로고    scopus 로고
    • Fox B. "Cooperative security": a model for the new enterprise. Journal, 1998. Retrieved from: .
    • Fox B. "Cooperative security": a model for the new enterprise. Journal, 1998. Retrieved from: .
  • 18
    • 19944387279 scopus 로고    scopus 로고
    • Why users cannot use security
    • Furnell S.M. Why users cannot use security. Computers and Security 24 4 (2005) 274-279
    • (2005) Computers and Security , vol.24 , Issue.4 , pp. 274-279
    • Furnell, S.M.1
  • 19
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: a survey of end-users
    • Furnell S.M., Jusoh A., and Katsabas D. The challenges of understanding and using security: a survey of end-users. Computers and Security 25 1 (2006) 27-35
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 27-35
    • Furnell, S.M.1    Jusoh, A.2    Katsabas, D.3
  • 21
    • 57649089762 scopus 로고    scopus 로고
    • Harris S. Learning guide: information security governance guide. Retrieved 5 March 2008, 2006a; Available from: .
    • Harris S. Learning guide: information security governance guide. Retrieved 5 March 2008, 2006a; Available from: .
  • 22
    • 57649084501 scopus 로고    scopus 로고
    • Harris S. Risk management strategies: key elements when building an information security program. Retrieved 5 March 2008, 2006b; Available from: .
    • Harris S. Risk management strategies: key elements when building an information security program. Retrieved 5 March 2008, 2006b; Available from: .
  • 23
    • 57649110202 scopus 로고    scopus 로고
    • The inside threat. (malicious insider)
    • [662]
    • Hinde S. The inside threat. (malicious insider). Computers aND Security 22 8 (2003) 665 [662]
    • (2003) Computers aND Security , vol.22 , Issue.8 , pp. 665
    • Hinde, S.1
  • 24
    • 57649087161 scopus 로고    scopus 로고
    • I3P. Human behavior, insider threat and awareness, Retrieved 13 August 2008, 2008; Available from: .
    • I3P. Human behavior, insider threat and awareness, Retrieved 13 August 2008, 2008; Available from: .
  • 25
    • 57649097868 scopus 로고    scopus 로고
    • IP Governance Task Force. Intellectual property & information security governance. Retrieved 13 February 2008, 2007; Available from: .
    • IP Governance Task Force. Intellectual property & information security governance. Retrieved 13 February 2008, 2007; Available from: .
  • 27
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • Leach J. Improving user security behaviour. Computers and Security 22 8 (2003) 685-692
    • (2003) Computers and Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 28
    • 0034196145 scopus 로고    scopus 로고
    • A review of empirical studies assessing ethical decision making in business
    • Loe T.W., Ferell L., and Mansfield P. A review of empirical studies assessing ethical decision making in business. Journal of Business Ethics 25 3 (2000) 185-204
    • (2000) Journal of Business Ethics , vol.25 , Issue.3 , pp. 185-204
    • Loe, T.W.1    Ferell, L.2    Mansfield, P.3
  • 29
    • 24344460927 scopus 로고    scopus 로고
    • A preliminary model of end user sophistication for insider threat prediction in IT systems
    • Magklaras G.B., and Furnell S.M. A preliminary model of end user sophistication for insider threat prediction in IT systems. Computers and Security 24 5 (2005) 371-380
    • (2005) Computers and Security , vol.24 , Issue.5 , pp. 371-380
    • Magklaras, G.B.1    Furnell, S.M.2
  • 31
    • 57649101709 scopus 로고    scopus 로고
    • Low-tech users threaten financial sector systems (update)
    • [12]
    • McCollum T. Low-tech users threaten financial sector systems (update). Internal Auditor 61 5 (2004) 18 [12]
    • (2004) Internal Auditor , vol.61 , Issue.5 , pp. 18
    • McCollum, T.1
  • 32
    • 4243139489 scopus 로고    scopus 로고
    • The HIPAApotamus in health care data security
    • Mercuri R.T. The HIPAApotamus in health care data security. Communications of the ACM 47 7 (2004) 25-28
    • (2004) Communications of the ACM , vol.47 , Issue.7 , pp. 25-28
    • Mercuri, R.T.1
  • 33
    • 14844320016 scopus 로고    scopus 로고
    • Data protection and freedom of information
    • Meredith B. Data protection and freedom of information. BMJ 330 7490 (2005) 490-491
    • (2005) BMJ , vol.330 , Issue.7490 , pp. 490-491
    • Meredith, B.1
  • 34
    • 57649098916 scopus 로고    scopus 로고
    • Data under surveillance: a government agency blends technology, audit, and investigative techniques to protect confidential information. (TECH FORUM) (Office of Internal Audit's Information Security Unit)
    • [23]
    • Moynihan J.F. Data under surveillance: a government agency blends technology, audit, and investigative techniques to protect confidential information. (TECH FORUM) (Office of Internal Audit's Information Security Unit). Internal Auditor 64 2 (2007) 29 [23]
    • (2007) Internal Auditor , vol.64 , Issue.2 , pp. 29
    • Moynihan, J.F.1
  • 35
    • 0035907673 scopus 로고    scopus 로고
    • Confidentiality in health records: evidence of current performance form a population survey in South Australia
    • Mulligan E.C. Confidentiality in health records: evidence of current performance form a population survey in South Australia. Medical Journal of Australia 174 12 (2001) 637-640
    • (2001) Medical Journal of Australia , vol.174 , Issue.12 , pp. 637-640
    • Mulligan, E.C.1
  • 36
    • 57649102620 scopus 로고    scopus 로고
    • National Threat Assessment Center. National Threat Assessment Center - insider threat study. Retrieved 13 August 2008, 2008; Available from: .
    • National Threat Assessment Center. National Threat Assessment Center - insider threat study. Retrieved 13 August 2008, 2008; Available from: .
  • 37
    • 57649090799 scopus 로고    scopus 로고
    • Nixu. Security management consulting. Retrieved 5 March 2008, 2008; Available from: .
    • Nixu. Security management consulting. Retrieved 5 March 2008, 2008; Available from: .
  • 38
    • 84986155773 scopus 로고    scopus 로고
    • Computer ethics: the influence of guidelines and universal moral beliefs
    • Peterson D.K. Computer ethics: the influence of guidelines and universal moral beliefs. Information Technology and People 15 4 (2002) 346-361
    • (2002) Information Technology and People , vol.15 , Issue.4 , pp. 346-361
    • Peterson, D.K.1
  • 39
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz E.E. A framework for understanding and predicting insider attacks. Computers and Security 21 6 (2002) 526-531
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 40
    • 84919200980 scopus 로고
    • Scott J.E., and Hirschi T. (Eds), Sage Publications,, Newbury Park, California
    • In: Scott J.E., and Hirschi T. (Eds). Controversial issues in crime and justice (1988), Sage Publications,, Newbury Park, California
    • (1988) Controversial issues in crime and justice
  • 41
    • 84948696241 scopus 로고    scopus 로고
    • Spil TAM, Stegwee RA, Teitink CJ. Business intelligence in healthcare organisations. In: Paper presented at the 35th Hawaii international conference on system sciences (HICSS-35'02), Hawaii; 2002.
    • Spil TAM, Stegwee RA, Teitink CJ. Business intelligence in healthcare organisations. In: Paper presented at the 35th Hawaii international conference on system sciences (HICSS-35'02), Hawaii; 2002.
  • 42
    • 0039084938 scopus 로고    scopus 로고
    • Achieving effective medical information security: understanding the culture
    • Stetson D. Achieving effective medical information security: understanding the culture. Bulletin of the American Society for Information Science 23 3 (1997) 17-21
    • (1997) Bulletin of the American Society for Information Science , vol.23 , Issue.3 , pp. 17-21
    • Stetson, D.1
  • 43
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: security planning models for management decision making
    • Straub D.W., and Welke R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly 22 4 (1998) 441-469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 44
    • 84887063880 scopus 로고    scopus 로고
    • An overview of SEISMED
    • Barber B., Treacher A., and Louwerse K. (Eds), IOS Press, Amsterdam
    • Treacher A., and Bleumer G. An overview of SEISMED. In: Barber B., Treacher A., and Louwerse K. (Eds). Towards security in medical telematics vol. 27 (1996), IOS Press, Amsterdam 4-8
    • (1996) Towards security in medical telematics , vol.27 , pp. 4-8
    • Treacher, A.1    Bleumer, G.2
  • 45
    • 18344376065 scopus 로고    scopus 로고
    • Exploitation of electronic medical records data in primary health care. Resistances and solutions. Study in eight Walloon health care centres
    • Vanmeerbeek M. Exploitation of electronic medical records data in primary health care. Resistances and solutions. Study in eight Walloon health care centres. Studies In Health Technology and Informatics 110 (2004) 42-48
    • (2004) Studies In Health Technology and Informatics , vol.110 , pp. 42-48
    • Vanmeerbeek, M.1
  • 46
    • 24644448811 scopus 로고    scopus 로고
    • Information security governance - compliance management vs operational management
    • von Solms B. Information security governance - compliance management vs operational management. Computers and Security 24 6 (2005) 443-447
    • (2005) Computers and Security , vol.24 , Issue.6 , pp. 443-447
    • von Solms, B.1
  • 47
    • 1242265154 scopus 로고    scopus 로고
    • In defense of the realm: understanding the threats to information security
    • Whitman M.E. In defense of the realm: understanding the threats to information security. International Journal of Information Management 24 1 (2004) 43-57
    • (2004) International Journal of Information Management , vol.24 , Issue.1 , pp. 43-57
    • Whitman, M.E.1
  • 48
    • 40949157392 scopus 로고    scopus 로고
    • Information governance: a model for security in medical practice
    • Williams P.A.H. Information governance: a model for security in medical practice. Journals of Digital Forensics, Security and Law 2 1 (2007) 57-72
    • (2007) Journals of Digital Forensics, Security and Law , vol.2 , Issue.1 , pp. 57-72
    • Williams, P.A.H.1
  • 50
    • 57649093091 scopus 로고    scopus 로고
    • How addressing implementation issues can assist in medical information security governance
    • Clarke N.L., and Furnell S.M. (Eds), Centre for Information Security & Network Research, University of Plymouth, Plymouth, UK
    • Williams P.A.H. How addressing implementation issues can assist in medical information security governance. In: Clarke N.L., and Furnell S.M. (Eds). Second international symposium on human aspects of information security and assurance (2008), Centre for Information Security & Network Research, University of Plymouth, Plymouth, UK 116-125
    • (2008) Second international symposium on human aspects of information security and assurance , pp. 116-125
    • Williams, P.A.H.1
  • 51
    • 49849085272 scopus 로고    scopus 로고
    • When trust defies common security sense
    • Williams P.A.H. When trust defies common security sense. Health Informatics Journal 14 3 (2008) 211-221
    • (2008) Health Informatics Journal , vol.14 , Issue.3 , pp. 211-221
    • Williams, P.A.H.1
  • 52
    • 33745439944 scopus 로고    scopus 로고
    • Understanding the offender/environment dynamic for computer crimes
    • Willison R. Understanding the offender/environment dynamic for computer crimes. Information Technology and People 19 2 (2006) 170-186
    • (2006) Information Technology and People , vol.19 , Issue.2 , pp. 170-186
    • Willison, R.1
  • 53
    • 24644478392 scopus 로고    scopus 로고
    • An insider threat model for adversary simulation
    • Anderson R.H., Bozek T., Longstaff T., Meitzer W., Skroch M., and Van Wyk K. (Eds), RAND
    • Wood B. An insider threat model for adversary simulation. In: Anderson R.H., Bozek T., Longstaff T., Meitzer W., Skroch M., and Van Wyk K. (Eds). Research on mitigating the insider threat to information systems - #2 (2002), RAND 41-48
    • (2002) Research on mitigating the insider threat to information systems - #2 , pp. 41-48
    • Wood, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.