메뉴 건너뛰기




Volumn 20, Issue 1, 2009, Pages 121-139

Choice and chance: A conceptual model of paths to information security compromise

Author keywords

Computer crime; Information security management; Information systems risk management

Indexed keywords

COMPUTER CRIME; INFORMATION SYSTEMS; INTRUSION DETECTION; RISK MANAGEMENT; SECURITY OF DATA;

EID: 67649548424     PISSN: 10477047     EISSN: 15265536     Source Type: Journal    
DOI: 10.1287/isre.1080.0174     Document Type: Article
Times cited : (159)

References (60)
  • 1
    • 0018503050 scopus 로고
    • Social learning and deviant behavior: A specific test of a general theory
    • Akers, R. L., M. Krohn, L. Lanza-Kaduce, M. Radosevich. 1979. Social learning and deviant behavior: A specific test of a general theory. Amer. Sociol. Rev. 44(4) 636-655.
    • (1979) Amer. Sociol. Rev. , vol.44 , Issue.4 , pp. 636-655
    • Akers, R.L.1    Krohn, M.2    Lanza-Kaduce, L.3    Radosevich, M.4
  • 4
    • 0002520483 scopus 로고    scopus 로고
    • Modeling IT ethics: A study in situational ethics
    • Banerjee, D., T. P. Cronan, T. W. Jones. 1998. Modeling IT ethics: A study in situational ethics. MIS Quart. 22(1) 31-60.
    • (1998) MIS Quart. , vol.22 , Issue.1 , pp. 31-60
    • Banerjee, D.1    Cronan, T.P.2    Jones, T.W.3
  • 5
    • 0023020183 scopus 로고
    • The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
    • Baron, R. M., D. A. Kenny. 1986. The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations. J. Personality Soc. Psych. 51(6) 1173-1182.
    • (1986) J. Personality Soc. Psych. , vol.51 , Issue.6 , pp. 1173-1182
    • Baron, R.M.1    Kenny, D.A.2
  • 6
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. 1993. Information systems security design methods: Implications for information systems development. ACM Comput. Surveys 25(4) 375-414.
    • (1993) ACM Comput. Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 7
    • 0001449665 scopus 로고
    • A new product growth for model consumer durables
    • Bass, F. 1969. A new product growth for model consumer durables. Management Sci. 15(5) 215-227.
    • (1969) Management Sci. , vol.15 , Issue.5 , pp. 215-227
    • Bass, F.1
  • 8
    • 0000787258 scopus 로고
    • Crime and punishment: An economic approach
    • Becker, G. 1968. Crime and punishment: An economic approach. J. Political Econom. 76(2) 169-217.
    • (1968) J. Political Econom. , vol.76 , Issue.2 , pp. 169-217
    • Becker, G.1
  • 9
    • 0039935773 scopus 로고
    • Implementing security and integrity in micro-mainframe networks
    • Boockholdt, J. L. 1989. Implementing security and integrity in micro-mainframe networks. MIS Quart. 13(2) 134-144.
    • (1989) MIS Quart. , vol.13 , Issue.2 , pp. 134-144
    • Boockholdt, J.L.1
  • 11
    • 34250050600 scopus 로고
    • Racial harrassment and the process of victimization
    • Bowling, B. 1993. Racial harrassment and the process of victimization. British J. Criminology 33(2) 231-250.
    • (1993) British J. Criminology , vol.33 , Issue.2 , pp. 231-250
    • Bowling, B.1
  • 13
    • 9744281201 scopus 로고    scopus 로고
    • Key issues in information systems management: 1994-1995 SIM Delphi results
    • Brancheau, J., B. Janz, J. Wetherbe. 1996. Key issues in information systems management: 1994-1995 SIM Delphi results. MIS Quart. 20(2) 225-242.
    • (1996) MIS Quart. , vol.20 , Issue.2 , pp. 225-242
    • Brancheau, J.1    Janz, B.2    Wetherbe, J.3
  • 14
    • 7444242205 scopus 로고    scopus 로고
    • The impact of Internet security breach announcements on market value of breached firms and Internet security developers
    • Cavusoglu, H., B. Mishra, S. Raghunathan. 2004. The impact of Internet security breach announcements on market value of breached firms and Internet security developers. Internat. J. Electronic Commerce 9(1) 69-104.
    • (2004) Internat. J. Electronic Commerce , vol.9 , Issue.1 , pp. 69-104
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 15
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H., B. Mishra, S. Raghunathan. 2005. The value of intrusion detection systems in information technology security architecture. Inform. Systems Res. 16(1) 28-46.
    • (2005) Inform. Systems Res. , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 16
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • Chakrabarti, A., G. Manimaran. 2002. Internet infrastructure security: A taxonomy. IEEE Network 16(6) 13-21.
    • (2002) IEEE Network , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 18
    • 0000204509 scopus 로고
    • Social change and crime rate change: A routine activity approach
    • Cohen, L. E., M. Felson. 1979. Social change and crime rate change: A routine activity approach. Amer. Sociol. Rev. 44(4) 588-608.
    • (1979) Amer. Sociol. Rev. , vol.44 , Issue.4 , pp. 588-608
    • Cohen, L.E.1    Felson, M.2
  • 19
    • 84934563431 scopus 로고
    • Toward an integrated theory of white-collar crime
    • Coleman, J. W. 1987. Toward an integrated theory of white-collar crime. Amer. J. Sociol. 93(2) 406-439.
    • (1987) Amer. J. Sociol. , vol.93 , Issue.2 , pp. 406-439
    • Coleman, J.W.1
  • 20
    • 34247732721 scopus 로고
    • Grounded theory research: Procedures, canons and evaluative criteria
    • Corbin, J., A. Strauss. 1990. Grounded theory research: Procedures, canons and evaluative criteria. Qualitative Sociol. 13(1) 3-21.
    • (1990) Qualitative Sociol. , vol.13 , Issue.1 , pp. 3-21
    • Corbin, J.1    Strauss, A.2
  • 21
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • Security Privacy, Oakland, CA
    • Cuppens, F., A. Miege. 2002. Alert correlation in a cooperative intrusion detection framework. Proc. 2002 IEEE Sympos. Security Privacy, Oakland, CA, 202-215.
    • (2002) Proc. 2002 IEEE Sympos , pp. 202-215
    • Cuppens, F.1    Miege, A.2
  • 22
    • 15944369564 scopus 로고    scopus 로고
    • Classification of computer attacks using a self-organizing map
    • U.S. Military Academy, West Point, NY
    • DeLooze, L. L. 2004. Classification of computer attacks using a self-organizing map. Proc. 2004 IEEE Workshop Inform. Assurance, U.S. Military Academy, West Point, NY, 365-369.
    • (2004) Proc. 2004 IEEE Workshop Inform. Assurance , pp. 365-369
    • DeLooze, L.L.1
  • 23
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G., J. Backhouse. 2001. Current directions in IS security research: Towards socio-organizational perspectives. Inform. Systems J. 11(2) 127-153.
    • (2001) Inform. Systems J. , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 25
    • 4243098281 scopus 로고    scopus 로고
    • Security and privacy issues of handheld and wearable wireless devices
    • DiPietro, R., L. V. Mancini. 2003. Security and privacy issues of handheld and wearable wireless devices. Comm. ACM 46(9) 74-79.
    • (2003) Comm. ACM , vol.46 , Issue.9 , pp. 74-79
    • DiPietro, R.1    Mancini, L.V.2
  • 26
    • 0036765493 scopus 로고    scopus 로고
    • Management's role in information security in a cyber economy
    • Dutta, A., K. McCrohan. 2002. Management's role in information security in a cyber economy. California Management Rev. 45(1) 67-87.
    • (2002) California Management Rev. , vol.45 , Issue.1 , pp. 67-87
    • Dutta, A.1    McCrohan, K.2
  • 27
    • 0000577656 scopus 로고
    • Participation in illegitimate activities: A theoretical and empirical investigation
    • Ehrlich, I. 1973. Participation in illegitimate activities: A theoretical and empirical investigation. J. Political Econom. 81(3) 521-565.
    • (1973) J. Political Econom. , vol.81 , Issue.3 , pp. 521-565
    • Ehrlich, I.1
  • 28
    • 0001985405 scopus 로고    scopus 로고
    • Crime, punishment and the market for offences
    • Ehrlich, I. 1996. Crime, punishment and the market for offences. J. Econom. Perspectives 10(1) 43-67.
    • (1996) J. Econom. Perspectives , vol.10 , Issue.1 , pp. 43-67
    • Ehrlich, I.1
  • 29
    • 0038172257 scopus 로고    scopus 로고
    • Cyberterrorism: Are we under siege?
    • Embar-Seddon, A. 2002. Cyberterrorism: Are we under siege? Amer. Behavioral Scientist 45(6) 1033-1043.
    • (2002) Amer. Behavioral Scientist , vol.45 , Issue.6 , pp. 1033-1043
    • Embar-Seddon, A.1
  • 30
    • 0005766289 scopus 로고    scopus 로고
    • Morality and computers: Attitudes and differences in moral judgments
    • Gattiker, U. E., H. Kelley. 1999. Morality and computers: Attitudes and differences in moral judgments. Inform. Systems Res. 10(3) 233-254.
    • (1999) Inform. Systems Res. , vol.10 , Issue.3 , pp. 233-254
    • Gattiker, U.E.1    Kelley, H.2
  • 32
    • 84990029315 scopus 로고    scopus 로고
    • The economics of information security investment
    • Gordon, L. A., M. P. Loeb. 2002. The economics of information security investment. ACM Trans. Inform. System Security 5(4) 438-457.
    • (2002) ACM Trans. Inform. System Security , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.A.1    Loeb, M.P.2
  • 34
    • 21944448888 scopus 로고    scopus 로고
    • Discourses of danger and the computer hacker
    • Halbert, D. 1997. Discourses of danger and the computer hacker. Inform. Soc. 13(4) 361-374.
    • (1997) Inform. Soc. , vol.13 , Issue.4 , pp. 361-374
    • Halbert, D.1
  • 35
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions
    • Harrington, S. J. 1996. The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions. MIS Quart. 20(3) 257-278.
    • (1996) MIS Quart. , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 37
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch, K. 2003. Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inform. System Security 6(4) 443-471.
    • (2003) ACM Trans. Inform. System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 38
    • 20944441343 scopus 로고    scopus 로고
    • Market for software vulnerabilities? Think again
    • Kannan, K., R. Telang. 2005. Market for software vulnerabilities? Think again. Management Sci. 51(5) 726-740.
    • (2005) Management Sci. , vol.51 , Issue.5 , pp. 726-740
    • Kannan, K.1    Telang, R.2
  • 39
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • Kemmerer, R. A., G. Vigna. 2002. Intrusion detection: A brief history and overview. IEEE Comput. 35(4) 27-30.
    • (2002) IEEE Comput. , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 40
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K. D., H. H. Carr, M. E. Warkentin. 1992. Threats to information systems: Today's reality, yesterday's understanding. MIS Quart. 16(2) 173-186.
    • (1992) MIS Quart. , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 41
    • 31644435983 scopus 로고    scopus 로고
    • Managing information security
    • Special Edition(2)
    • Lohmeyer, D. F., J. McCrory, S. Pogreb. 2002. Managing information security. McKinsey Quart. Special Edition(2) 12-16.
    • (2002) McKinsey Quart , pp. 12-16
    • Lohmeyer, D.F.1    McCrory, J.2    Pogreb, S.3
  • 45
    • 0000052619 scopus 로고    scopus 로고
    • Authentication, access control, and audit
    • Sandhu, R., P. Samarati. 1996. Authentication, access control, and audit. ACM Comput. Surveys 28(1) 241-243.
    • (1996) ACM Comput. Surveys , vol.28 , Issue.1 , pp. 241-243
    • Sandhu, R.1    Samarati, P.2
  • 46
    • 0036909696 scopus 로고    scopus 로고
    • The security of confidential numerical data in databases
    • Sarathy, R., K. Muralidhar. 2002. The security of confidential numerical data in databases. Inform. Systems Res. 13(4) 389-403.
    • (2002) Inform. Systems Res. , vol.13 , Issue.4 , pp. 389-403
    • Sarathy, R.1    Muralidhar, K.2
  • 47
    • 30344453851 scopus 로고    scopus 로고
    • How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks
    • G. Davida, Y. Frankel, O. Rees, eds. January 27-30, 2003, Lecture Notes in Computer Science, 2742, LCNS 2437. Springer-Verlag, New York
    • Schechter, S. E., M. D. Smith. 2003. How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks. G. Davida, Y. Frankel, O. Rees, eds. Proc. Seventh Financial Cryptography Conf., January 27-30, 2003, Lecture Notes in Computer Science, 2742, LCNS 2437. Springer-Verlag, New York, 7-10.
    • (2003) Proc. Seventh Financial Cryptography Conf. , pp. 7-10
    • Schechter, S.E.1    Smith, M.D.2
  • 48
    • 24944436916 scopus 로고    scopus 로고
    • Sarbanes-Oxley: A huge boon to information security in the US
    • Schultz, E. 2004. Sarbanes-Oxley: A huge boon to information security in the US. Comput. Security 23(5) 353-354.
    • (2004) Comput. Security , vol.23 , Issue.5 , pp. 353-354
    • Schultz, E.1
  • 49
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
    • Siponen, M. 2005. Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods. Inform. Organ. 15 339-375.
    • (2005) Inform. Organ. , vol.15 , pp. 339-375
    • Siponen, M.1
  • 50
    • 0002037905 scopus 로고
    • Asymptotic confidence intervals for indirect effects in structural equation models
    • Sobel, M. E. 1982. Asymptotic confidence intervals for indirect effects in structural equation models. Sociol. Methodology 13 290-312.
    • (1982) Sociol. Methodology , vol.13 , pp. 290-312
    • Sobel, M.E.1
  • 51
    • 85041822425 scopus 로고    scopus 로고
    • The privacy rule, security rule, and transaction standards: Three sides of the same coin
    • Speers, T., S. Wilcox, B. Brown. 2004. The privacy rule, security rule, and transaction standards: Three sides of the same coin. J. Health Care Compliance 6(1) 11-14.
    • (2004) J. Health Care Compliance , vol.6 , Issue.1 , pp. 11-14
    • Speers, T.1    Wilcox, S.2    Brown, B.3
  • 52
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. W. 1990. Effective IS security: An empirical study. Inform. Systems Res. 1(3) 255-276.
    • (1990) Inform. Systems Res. , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 53
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Straub, D. W., W. D. Nance. 1990. Discovering and disciplining computer abuse in organizations: A field study. MIS Quart. 14(1) 45-60.
    • (1990) MIS Quart. , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 54
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., R. J. Welke. 1998. Coping with systems risk: Security planning models for management decision making. MIS Quart. 22(4) 441-469.
    • (1998) MIS Quart. , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 56
    • 0037967312 scopus 로고    scopus 로고
    • Flow-based model of computer hacker's motivation
    • Voiskounsky, A. E., O. V. Smyslova. 2003. Flow-based model of computer hacker's motivation. Cyber Psych. Behav. 6(2) 171-180.
    • (2003) Cyber Psych. Behav. , vol.6 , Issue.2 , pp. 171-180
    • Voiskounsky, A.E.1    Smyslova, O.V.2
  • 57
    • 9744248960 scopus 로고    scopus 로고
    • Theoretically speaking
    • Weber, R. 2002. Theoretically speaking. MIS Quart. 27(3) iii-xii.
    • (2002) MIS Quart. , vol.27 , Issue.3
    • Weber, R.1
  • 58
    • 0001268563 scopus 로고
    • What constitutes a theoretical contribution?
    • Whetten, D. A. 1989. What constitutes a theoretical contribution? Acad. Management Rev. 14(4) 490-495.
    • (1989) Acad. Management Rev. , vol.14 , Issue.4 , pp. 490-495
    • Whetten, D.A.1
  • 60
    • 0141798248 scopus 로고    scopus 로고
    • Editor's comments
    • Zmud, R. 1998. Editor's comments. MIS Quart. 22(2) 7-10.
    • (1998) MIS Quart. , vol.22 , Issue.2 , pp. 7-10
    • Zmud, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.