메뉴 건너뛰기




Volumn , Issue , 2008, Pages 35-47

Human, organizational and technological challenges of implementing information security in organizations

Author keywords

Organizational security; Qualitative analysis; Security challenges

Indexed keywords

MOBILE SECURITY; SECURITY SYSTEMS; SOCIETIES AND INSTITUTIONS;

EID: 64849114056     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (23)
  • 2
    • 34948850959 scopus 로고    scopus 로고
    • On the imbalance of the security problem space and its expected consequences
    • 12
    • Beznosov, K. and Beznosova, O. (2007). 'On the Imbalance of the Security Problem Space and its Expected Consequences'. Information Management & Computer Security 15(5):420-431 (12).
    • (2007) Information Management & Computer Security , vol.15 , Issue.5 , pp. 420-431
    • Beznosov, K.1    Beznosova, O.2
  • 3
    • 36849085382 scopus 로고    scopus 로고
    • Towards understanding IT security professionals and their tools
    • Pittsburgh, Pennsylvania
    • Botta, D., et al. (2007). 'Towards Understanding IT Security Professionals and Their Tools'. In SOUPS Proceedings, pp. 100-111, Pittsburgh, Pennsylvania.
    • (2007) SOUPS Proceedings , pp. 100-111
    • Botta, D.1
  • 4
    • 33645031405 scopus 로고    scopus 로고
    • Organisational factors to the effectiveness of implementing information security management
    • Chang, S. and Ho, C. (2006). 'Organisational factors to the effectiveness of implementing information security management'. Information Management & Computer Security, vol. 106, pp. 345-361.
    • (2006) Information Management & Computer Security , vol.106 , pp. 345-361
    • Chang, S.1    Ho, C.2
  • 8
    • 67650962431 scopus 로고    scopus 로고
    • Information security governance reporting
    • Garigue, R. and Stefaniu, M. (2003). 'Information Security Governance Reporting'. EDPACS 31(6):11-17.
    • (2003) EDPACS , vol.31 , Issue.6 , pp. 11-17
    • Garigue, R.1    Stefaniu, M.2
  • 12
    • 33749496395 scopus 로고    scopus 로고
    • A framework for outsourcing IS/IT security services
    • Karyda, M., et al. (2006). 'A framework for outsourcing IS/IT security services'. Information Management & Computer Security 14:403-416.
    • (2006) Information Management & Computer Security , vol.14 , pp. 403-416
    • Karyda, M.1
  • 13
    • 33644533141 scopus 로고    scopus 로고
    • Information security: Management's effect on culture and policy
    • Knapp, K., et al. (2006). 'Information security: management's effect on culture and policy'. Information Management & Computer Security 14(1):24-36.
    • (2006) Information Management & Computer Security , vol.14 , Issue.1 , pp. 24-36
    • Knapp, K.1
  • 14
    • 77954505756 scopus 로고    scopus 로고
    • The interrelationship and effect of culture and risk communication in setting internet banking security goals
    • New York, NY, USA. ACM Press
    • Koskosas, I. and Paul, R. (2004). 'The interrelationship and effect of culture and risk communication in setting internet banking security goals'. In ICEC '04, pp. 341-350, New York, NY, USA. ACM Press.
    • (2004) ICEC '04 , pp. 341-350
    • Koskosas, I.1    Paul, R.2
  • 15
    • 33750513188 scopus 로고    scopus 로고
    • Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    • Kraemer, S. and Carayon, P. (2007). 'Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists'. Applied Ergonomics 38:143-154.
    • (2007) Applied Ergonomics , vol.38 , pp. 143-154
    • Kraemer, S.1    Carayon, P.2
  • 16
    • 34948822955 scopus 로고    scopus 로고
    • How well are information risks being communicated to your computer end-users?
    • Pattinson, M. and Anderson, G. (2007). 'How well are information risks being communicated to your computer end-users?'. Information Management & Computer Security 15.
    • (2007) Information Management & Computer Security , pp. 15
    • Pattinson, M.1    Anderson, G.2
  • 17
    • 0036532101 scopus 로고    scopus 로고
    • An empirical study of industrial securityengineering practices
    • Rayford, R., Vaughn, B. and Fox, K. (2001). 'An empirical study of industrial securityengineering practices'. The Journal of Systems and Software 61:225-232.
    • (2001) The Journal of Systems and Software , vol.61 , pp. 225-232
    • Rayford, R.1    Vaughn, B.2    Fox, K.3
  • 18
    • 0034241415 scopus 로고    scopus 로고
    • Whatever happened to qualitative description?
    • Sandelowski, M. (2000). 'Whatever Happened to Qualitative Description?'. Research in Nursing & Health 23(4):334-340.
    • (2000) Research in Nursing & Health , vol.23 , Issue.4 , pp. 334-340
    • Sandelowski, M.1
  • 19
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. and Welke, R. (1998). 'Coping with systems risk: security planning models for management decision making'. MIS Q. 22(4):441-469.
    • (1998) MIS Q , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.1    Welke, R.2
  • 20
    • 34948812617 scopus 로고    scopus 로고
    • Toward viable information security reporting systems
    • 12
    • Sveen, F., et al. (2007). 'Toward Viable Information Security Reporting Systems'. Information Management & Computer Security 15(5):408-419 (12).
    • (2007) Information Management & Computer Security , vol.15 , Issue.5 , pp. 408-419
    • Sveen, F.1
  • 21
    • 15744368808 scopus 로고    scopus 로고
    • Information security obedience: A definition
    • Thomson, K. and von Solms, R. (2005). 'Information security obedience: a definition'. Computers & Security 24(1):69-75.
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 69-75
    • Thomson, K.1    Von Solms, R.2
  • 22
    • 33744805562 scopus 로고    scopus 로고
    • Formulating information systems risk management strategies through cultural theory
    • Tsohou, A., et al. (2006). 'Formulating information systems risk management strategies through cultural theory'. Information Management & Computer Security 14(3):198-217.
    • (2006) Information Management & Computer Security , vol.14 , Issue.3 , pp. 198-217
    • Tsohou, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.