메뉴 건너뛰기




Volumn 67, Issue 4, 2009, Pages 281-296

Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science

Author keywords

e Science; Security; Security design; Socio technical design; Usable security

Indexed keywords

MOTIVATION; RISK ASSESSMENT;

EID: 59649086633     PISSN: 10715819     EISSN: 10959300     Source Type: Journal    
DOI: 10.1016/j.ijhcs.2007.10.002     Document Type: Article
Times cited : (23)

References (34)
  • 2
    • 0038588452 scopus 로고    scopus 로고
    • Privacy in multimedia communications: Protecting users, not just data
    • Blandford, A, Vanderdonkt, J, Gray, P, Eds, Lille, September, Springer, pp
    • Adams, A., Sasse, M., 2001. Privacy in multimedia communications: protecting users, not just data. In: Blandford, A., Vanderdonkt, J., Gray, P. (Eds.), People and Computers XV - Interaction Without Frontiers. Joint Proceedings of HCI2001 and ICM2001, Lille, September 2001, Springer, pp. 49-64.
    • (2001) People and Computers XV - Interaction Without Frontiers. Joint Proceedings of HCI2001 and ICM2001 , pp. 49-64
    • Adams, A.1    Sasse, M.2
  • 3
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibilities and security of information systems
    • Backhouse J., and Dhillon G. Structures of responsibilities and security of information systems. European Journal of Information Systems 5 1 (1996) 2-9
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-9
    • Backhouse, J.1    Dhillon, G.2
  • 4
    • 24044550516 scopus 로고
    • Rethinking the concept of user involvement
    • March, Society for Information Management and The Management Information Systems Research Center, Minneapolis, MN, USA, pp
    • Barki, H., Hartwick, J., 1989. Rethinking the concept of user involvement. In: MIS Quarterly, March, vol. 13 (1). Society for Information Management and The Management Information Systems Research Center, Minneapolis, MN, USA, pp. 53-63.
    • (1989) MIS Quarterly , vol.13 , Issue.1 , pp. 53-63
    • Barki, H.1    Hartwick, J.2
  • 5
    • 59649100150 scopus 로고    scopus 로고
    • Baskerville, R., 1999. Investigating informations systems with action research. In: Communications of AIS, 2, Article 19. Association for Information Systems, Atlanta, GA, USA, p. 4.
    • Baskerville, R., 1999. Investigating informations systems with action research. In: Communications of AIS, vol. 2, Article 19. Association for Information Systems, Atlanta, GA, USA, p. 4.
  • 7
    • 59649091371 scopus 로고    scopus 로고
    • Butler, S., 2000. Security design: Why it's hard to do empirical research. URL 〈http://www-2.cs.cmu.edu/~Vit/paperabstracts/secure.butler.html〉.
    • Butler, S., 2000. Security design: Why it's hard to do empirical research. URL 〈http://www-2.cs.cmu.edu/~Vit/paperabstracts/secure.butler.html〉.
  • 8
    • 79551470060 scopus 로고    scopus 로고
    • A case study of user participation in the information systems development process
    • Association for Information Systems, Atlanta, GA, USA, pp
    • Butler, T., Fitzgerald, B., 1997. A case study of user participation in the information systems development process. In: ICIS '97: Proceedings of the Eighteenth International Conference on Information Systems. Association for Information Systems, Atlanta, GA, USA, pp. 411-426.
    • (1997) ICIS '97: Proceedings of the Eighteenth International Conference on Information Systems , pp. 411-426
    • Butler, T.1    Fitzgerald, B.2
  • 9
    • 59649125480 scopus 로고    scopus 로고
    • CLEF, URL
    • CLEF, 2004. Clinical e-science Framework. URL 〈http://www.clinical-escience.org/〉.
    • (2004) Clinical e-science Framework
  • 10
    • 0002447216 scopus 로고
    • Norms and normative behaviour: field studies of social interdependence
    • Academic Press, New York
    • Darley J., and Latané B. Norms and normative behaviour: field studies of social interdependence. Altruism and Helping Behaviour (1970), Academic Press, New York 83-101
    • (1970) Altruism and Helping Behaviour , pp. 83-101
    • Darley, J.1    Latané, B.2
  • 11
    • 34548176302 scopus 로고    scopus 로고
    • URL
    • Department of Trade and Industry, 2006. Information Security Breaches Survey. URL 〈http://www.pwc.com/uk/eng/ins-sol/publ/pwcdti-fullsurveyresults06.pdf〉.
    • (2006) Information Security Breaches Survey
  • 12
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in is security research: towards socio-organizational perspectives
    • Dhillon G., and Backhouse J. Current directions in is security research: towards socio-organizational perspectives. Information Systems Journal 11 (2001) 127-153
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 14
    • 17644401409 scopus 로고    scopus 로고
    • Bringing security home: A process for developing secure and usable systems
    • ACM Press, New York, USA, pp
    • Flechais, I., Sasse, M., Hailes, S. M., 2003. Bringing security home: a process for developing secure and usable systems. In: New Security Paradigms Workshop. ACM Press, New York, USA, pp. 49-57.
    • (2003) New Security Paradigms Workshop , pp. 49-57
    • Flechais, I.1    Sasse, M.2    Hailes, S.M.3
  • 16
    • 59649124670 scopus 로고    scopus 로고
    • Small world, water coolers, and the challenge of remote collaboration
    • ACM Press, New York, USA
    • Gorlenko L. Small world, water coolers, and the challenge of remote collaboration. Interactions vol. 12 (6) (2005), ACM Press, New York, USA 42-44
    • (2005) Interactions , vol.12 6 , pp. 42-44
    • Gorlenko, L.1
  • 25
    • 0041091236 scopus 로고
    • Managing the change to an automated office: lessons from five case studies
    • Rousseau D. Managing the change to an automated office: lessons from five case studies. Office: Technology & People 4 (1989) 31-52
    • (1989) Office: Technology & People , vol.4 , pp. 31-52
    • Rousseau, D.1
  • 26
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer J., and Schroeder M. The protection of information in computer systems. Proceeding of the IEEE 63 9 (1975) 1278-1308
    • (1975) Proceeding of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 28
    • 0011644488 scopus 로고    scopus 로고
    • An analysis of the recent is security development approaches: Descriptive and prescriptive implications
    • Idea Group Publishing, pp
    • Siponen, M. T., 2001. An analysis of the recent is security development approaches: Descriptive and prescriptive implications. In: Information Security Management: Global Challenges in the New Millennium, Idea Group Publishing, pp. 101-123.
    • (2001) Information Security Management: Global Challenges in the New Millennium , pp. 101-123
    • Siponen, M.T.1
  • 29
    • 84904255922 scopus 로고    scopus 로고
    • Siponen, M., Baskerville, R., 2001. A new paradigm for adding security into IS development methods. In: Proceedings of the IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Kluwer, B.V., Deventer, The Netherlands, pp. 99-112.
    • Siponen, M., Baskerville, R., 2001. A new paradigm for adding security into IS development methods. In: Proceedings of the IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Advances in Information Security Management & Small Systems Security, Kluwer, B.V., Deventer, The Netherlands, pp. 99-112.
  • 30
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for managerial decision-making
    • Straub D.W., and Welke R.J. Coping with systems risk: Security planning models for managerial decision-making. MIS Quarterly 22 4 (1998) 441-469
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 31
    • 55249119617 scopus 로고
    • The effect of user involvement on system success: A contingency approach
    • Tait P., and Vessey I. The effect of user involvement on system success: A contingency approach. MIS Quarterly 12 1 (1988) 91-107
    • (1988) MIS Quarterly , vol.12 , Issue.1 , pp. 91-107
    • Tait, P.1    Vessey, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.