메뉴 건너뛰기




Volumn 24, Issue 3, 2008, Pages 349-375

Dynamics of organizational information security

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION MANAGEMENT; INFORMATION TECHNOLOGY; MODELING; RISK;

EID: 63649087849     PISSN: 08837066     EISSN: 10991727     Source Type: Journal    
DOI: 10.1002/sdr.405     Document Type: Article
Times cited : (29)

References (56)
  • 1
    • 84976842520 scopus 로고
    • Lessons learned from modeling the dynamics of software development
    • Abdel-Hamid T, Madnick S. 1989. Lessons learned from modeling the dynamics of software development. Communications of the ACM 32(12):1426-1455.
    • (1989) Communications of the ACM , vol.32 , Issue.12 , pp. 1426-1455
    • Abdel-Hamid, T.1    Madnick, S.2
  • 2
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of user's view on information security
    • Albrechtsen E. 2007. A qualitative study of user's view on information security. Computers and Security 26(4): 276.
    • (2007) Computers and Security , vol.26 , Issue.4 , pp. 276
    • Albrechtsen, E.1
  • 3
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Anderson R, Moore T. 2006. The economics of information security. Science 314(5799): 610-613.
    • (2006) Science , vol.314 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 4
    • 33846183559 scopus 로고    scopus 로고
    • Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
    • Arora A, Nandkumar A, Telang R. 2006. Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Information Systems Frontiers 8(5): 350.
    • (2006) Information Systems Frontiers , vol.8 , Issue.5 , pp. 350
    • Arora, A.1    Nandkumar, A.2    Telang, R.3
  • 5
    • 33750703619 scopus 로고    scopus 로고
    • Network software ecurity and user incentives
    • August T, Tunca TI. 2006. Network software "ecurity and user incentives. Management Science 52(11): 1703-1720.
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 6
    • 61349202831 scopus 로고    scopus 로고
    • Let the pirates patch? An economic analysis of software security patch restrictions
    • August T, Tunca TI. 2008. Let the pirates patch? An economic analysis of software security patch restrictions. Information Systems Research 19(1): 48-70.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 48-70
    • August, T.1    Tunca, T.I.2
  • 7
    • 2642549662 scopus 로고    scopus 로고
    • Computer security. and risky computing practices: A rational choice perspective
    • Aytes K, Connolly T. 2004. Computer security. and risky computing practices: a rational choice perspective. Journal of Organizational and End User Computing 16(3): 22-40.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 9
    • 63649151361 scopus 로고    scopus 로고
    • Security breaches hitting home. American Banker$ Association
    • Bielski L. 2005. Security breaches hitting home. American Banker$ Association. ABA Banking Journal 97(6): 7-8.
    • (2005) ABA Banking Journal , vol.97 , Issue.6 , pp. 7-8
    • Bielski, L.1
  • 10
    • 63649123786 scopus 로고    scopus 로고
    • Data security no longer a technical issue: Lawyers point to corporate legal obligations
    • Bologna M. 2005. Data security no longer a technical issue: lawyers point to corporate legal obligations. BNA's Banking Report 84(15): 681-682.
    • (2005) BNA's Banking Report , vol.84 , Issue.15 , pp. 681-682
    • Bologna, M.1
  • 12
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell K, Gordon LA, Loeb MP, Zhou L. 2003. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11(3): 431-448.
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.A.2    Loeb, M.P.3    Zhou, L.4
  • 13
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu H, Mishra B, Raghunathan S. 2005. The value of intrusion detection systems in information technology security architecture. Information Systems Research 16(1): 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 14
    • 61849135265 scopus 로고    scopus 로고
    • Security patch management: Share the burden or share the damage?
    • Cavusoglu H, Cavusoglu H, Zhang J. 2008. Security patch management: share the burden or share the damage? Management Science 54(4): 657-670.
    • (2008) Management Science , vol.54 , Issue.4 , pp. 657-670
    • Cavusoglu, H.1    Cavusoglu, H.2    Zhang, J.3
  • 15
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security in the workplace: Linking information security climate to compliant behavior
    • Chan M, Woon I, Kankanhalli A. 2005. Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of Information Privacy and Security 1(3): 18-41.
    • (2005) Journal of Information Privacy and Security , vol.1 , Issue.3 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 16
    • 60049085275 scopus 로고    scopus 로고
    • Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system
    • Chen CC, Shaw RS, Yang SC. 2006. Mitigating information security risks by increasing user security awareness: a case study of an information security awareness system. Information Technology, Learning, and Performance Journal 24(1): 1-14.
    • (2006) Information Technology, Learning, and Performance Journal , vol.24 , Issue.1 , pp. 1-14
    • Chen, C.C.1    Shaw, R.S.2    Yang, S.C.3
  • 17
    • 34249060259 scopus 로고    scopus 로고
    • Evaluating application service provisioning using system dynamics methodology
    • Currie WL, Joyce P, Winch G. 2007. Evaluating application service provisioning using system dynamics methodology. British Journal of Management 18(2): 172-191.
    • (2007) British Journal of Management , vol.18 , Issue.2 , pp. 172-191
    • Currie, W.L.1    Joyce, P.2    Winch, G.3
  • 18
    • 35148886676 scopus 로고    scopus 로고
    • An information security governance framework
    • Da. Veiga A, Eloff JHP. 2007. An information security governance framework. Information Systems Management 24(4): 361-372.
    • (2007) Information Systems Management , vol.24 , Issue.4 , pp. 361-372
    • Da1    Veiga, A.2    Eloff, J.H.P.3
  • 19
    • 0037534168 scopus 로고    scopus 로고
    • Performance impacts of information technology: Is actual usage the missing link?
    • Devaraj S, Kohli R. 2003. Performance impacts of information technology: is actual usage the missing link? Management Science 49(3): 273-289.
    • (2003) Management Science , vol.49 , Issue.3 , pp. 273-289
    • Devaraj, S.1    Kohli, R.2
  • 20
    • 0036765493 scopus 로고    scopus 로고
    • Management's role in information security in a cyber economy
    • Dutta A, McCrohan K. 2002. Management's role in information security in a cyber economy. California Management Review 45(1): 67-87.
    • (2002) California Management Review , vol.45 , Issue.1 , pp. 67-87
    • Dutta, A.1    McCrohan, K.2
  • 21
    • 28844477995 scopus 로고    scopus 로고
    • Offshore outsourcing: A dynamic causal modell of counteracting forces
    • Dutta A, Roy R. 2005. Offshore outsourcing: a dynamic causal modell of counteracting forces, Journal of Management Information Systems 22(2): 15-35.
    • (2005) Journal of Management Information Systems , vol.22 , Issue.2 , pp. 15-35
    • Dutta, A.1    Roy, R.2
  • 22
    • 63649153633 scopus 로고    scopus 로고
    • Customer information: Protecting the organization's most critical asset from misappropriation and identity theft
    • Ellison RJ, LeClerc R. 2006. Customer information: protecting the organization's most critical asset from misappropriation and identity theft. Journal of Information Privacy and Security 2(1): 3-15.
    • (2006) Journal of Information Privacy and Security , vol.2 , Issue.1 , pp. 3-15
    • Ellison, R.J.1    LeClerc, R.2
  • 23
    • 63649158641 scopus 로고    scopus 로고
    • In wake of FTC investigation, monster touts new safeguards
    • Frauenheim E. 2008. In wake of FTC investigation, monster touts new safeguards. Workforce Management 87(4): 4.
    • (2008) Workforce Management , vol.87 , Issue.4 , pp. 4
    • Frauenheim, E.1
  • 24
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or E, Ghose A. 2005. The economic incentives for sharing security information. Information Systems Research 16(2): 186-208.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 25
    • 63449140968 scopus 로고    scopus 로고
    • Disruptive innovation strategy effects the on hard-disk maker population: A system dynamics study
    • Georgantzas NC, Katsamakas E. 2007. Disruptive innovation strategy effects the on hard-disk maker population: a system dynamics study. Information Resources Management Journal 20(2): 90-107.
    • (2007) Information Resources Management Journal , vol.20 , Issue.2 , pp. 90-107
    • Georgantzas, N.C.1    Katsamakas, E.2
  • 29
    • 33846128415 scopus 로고    scopus 로고
    • Economic aspects of information security: An emerging field of research
    • Gordon LA, Loeb MP. 2006. Economic aspects of information security: an emerging field of research. Information Systemg Frontiers 8(5): 335.
    • (2006) Information Systemg Frontiers , vol.8 , Issue.5 , pp. 335
    • Gordon, L.A.1    Loeb, M.P.2
  • 30
    • 0038445906 scopus 로고    scopus 로고
    • Quality improvement and infrastructure activity costs in software development: A longitudinal analysis
    • Harter DE, Slaughter SA. 2003. Quality improvement and infrastructure activity costs in software development: a longitudinal analysis. Management Science 49(6): 784-800.
    • (2003) Management Science , vol.49 , Issue.6 , pp. 784-800
    • Harter, D.E.1    Slaughter, S.A.2
  • 31
    • 33846138611 scopus 로고    scopus 로고
    • Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    • Hausken K. 2006. Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers 8(5): 338.
    • (2006) Information Systems Frontiers , vol.8 , Issue.5 , pp. 338
    • Hausken, K.1
  • 34
    • 33750513188 scopus 로고    scopus 로고
    • Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    • Kraemer S, Carayon P. 2007. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. Applied Ergonomics 38(2): 143.
    • (2007) Applied Ergonomics , vol.38 , Issue.2 , pp. 143
    • Kraemer, S.1    Carayon, P.2
  • 35
    • 7444249783 scopus 로고    scopus 로고
    • A framework for assessing the business value of information technology infrastructures
    • Kumar R. 2004. A framework for assessing the business value of information technology infrastructures. Journal of Management Information Systems 21(2): 11-32.
    • (2004) Journal of Management Information Systems , vol.21 , Issue.2 , pp. 11-32
    • Kumar, R.1
  • 36
    • 63649139643 scopus 로고    scopus 로고
    • The human element: The weakest link in information security
    • 44-46
    • Lineberry S. 2007. The human element: the weakest link in information security. Journal of Accountancy 204(5): 44-46, 49.
    • (2007) Journal of Accountancy , vol.204 , Issue.5 , pp. 49
    • Lineberry, S.1
  • 38
    • 35348859021 scopus 로고    scopus 로고
    • Perception of risk and the strategic impact of existing IT on information security strategy at board level
    • McFadzean E, Ezingeard JN, Birchall D. 2007. Perception of risk and the strategic impact of existing IT on information security strategy at board level. Online Information Review 31(5): 622.
    • (2007) Online Information Review , vol.31 , Issue.5 , pp. 622
    • McFadzean, E.1    Ezingeard, J.N.2    Birchall, D.3
  • 39
    • 63649142259 scopus 로고    scopus 로고
    • Moore A, Cappelli D, Joseph H, Trzeciak R. 2007. An experience using system dynamics to facilitate an insider threat workshop. In Proceedings of the International System Dynamics Conference, Boston, MA.
    • Moore A, Cappelli D, Joseph H, Trzeciak R. 2007. An experience using system dynamics to facilitate an insider threat workshop. In Proceedings of the International System Dynamics Conference, Boston, MA.
  • 40
    • 0022093750 scopus 로고
    • Rationality in the analysis of behavioral simulatidn models
    • Morecroft JDW. 1985. Rationality in the analysis of behavioral simulatidn models. Management Science 31(7): 900-916.
    • (1985) Management Science , vol.31 , Issue.7 , pp. 900-916
    • Morecroft, J.D.W.1
  • 41
    • 63649157114 scopus 로고    scopus 로고
    • VA creating-security culture
    • Mosquera M. 2008. VA creating-security culture. Federal Computer Week 22(7): 12.
    • (2008) Federal Computer Week , vol.22 , Issue.7 , pp. 12
    • Mosquera, M.1
  • 42
    • 63649115332 scopus 로고    scopus 로고
    • Data secured? Taking on cyber-thievery
    • 22 24
    • O'Rourke M. 2005. Data secured? Taking on cyber-thievery. Risk Management 52(10): 18-20, 22, 24.
    • (2005) Risk Management , vol.52 , Issue.10 , pp. 18-20
    • O'Rourke, M.1
  • 43
  • 44
    • 0000633713 scopus 로고
    • Boom, bust and failures to learn in experimental markets
    • Paich M, Sterman JD. 1993. Boom, bust and failures to learn in experimental markets. Management Science 39(12): 1439-1458.
    • (1993) Management Science , vol.39 , Issue.12 , pp. 1439-1458
    • Paich, M.1    Sterman, J.D.2
  • 45
    • 63649130091 scopus 로고    scopus 로고
    • Intelligence is the best defense
    • Piazza P. 2004. Intelligence is the best defense. Security Management 48(9): 56-65.
    • (2004) Security Management , vol.48 , Issue.9 , pp. 56-65
    • Piazza, P.1
  • 46
    • 63649093962 scopus 로고    scopus 로고
    • Clickstream data reveals top five increases in vehicle make searches on kbb.com. 22 March
    • PR Newswire 2006. Clickstream data reveals top five increases in vehicle make searches on kbb.com. 22 March.
    • (2006) PR Newswire
  • 51
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
    • Sun L, Srivastava RP, Mock TJ. 2006. An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems 22(4): 109-142.
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.1    Srivastava, R.P.2    Mock, T.J.3
  • 52
    • 35548988920 scopus 로고    scopus 로고
    • Overcoming organizational challenges to secure knowledge
    • Sveen FO, Rich E, Jager M. 2007a. Overcoming organizational challenges to secure knowledge. Information Systems Frontiers 9(5): 481-492.
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 481-492
    • Sveen, F.O.1    Rich, E.2    Jager, M.3
  • 54
    • 34547409379 scopus 로고    scopus 로고
    • Modeling The IT value paradox. Association for Computing Machinery
    • Thatcher ME, Pingry DE. 2007. Modeling The IT value paradox. Association for Computing Machinery. Communications of the ACM 50(8): 41-45.
    • (2007) Communications of the ACM , vol.50 , Issue.8 , pp. 41-45
    • Thatcher, M.E.1    Pingry, D.E.2
  • 55
    • 61349180141 scopus 로고    scopus 로고
    • A value-at-risk approach to information security investment
    • Wang J, Chaudhury A, Rao HR. 2008. A value-at-risk approach to information security investment. Information Systems Research 19(1): 106-123.
    • (2008) Information Systems Research , vol.19 , Issue.1 , pp. 106-123
    • Wang, J.1    Chaudhury, A.2    Rao, H.R.3
  • 56
    • 33750683067 scopus 로고    scopus 로고
    • Understanding the perpetration of employee computer crime in the organisational context
    • Willison R. 2006. Understanding the perpetration of employee computer crime in the organisational context. Information and Organization 16(4): 304.
    • (2006) Information and Organization , vol.16 , Issue.4 , pp. 304
    • Willison, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.