메뉴 건너뛰기




Volumn 18, Issue 2, 2009, Pages 101-105

Behavioral and policy issues in information systems security: The insider threat

Author keywords

[No Author keywords available]

Indexed keywords


EID: 67650170305     PISSN: 0960085X     EISSN: 14769344     Source Type: Journal    
DOI: 10.1057/ejis.2009.12     Document Type: Review
Times cited : (318)

References (18)
  • 1
    • 55249099424 scopus 로고
    • Mapping the intellectual structure of MIS, 1980-1985: A co-citation analysis
    • CULNAN M. (1987) Mapping the intellectual structure of MIS, 1980-1985: a co-citation analysis. MIS Quarterly 11(3), 341-353.
    • (1987) MIS Quarterly , vol.11 , Issue.3 , pp. 341-353
    • CULNAN, M.1
  • 2
    • 67650174475 scopus 로고    scopus 로고
    • ERNST and YOUNG (2008) Moving beyond compliance: Ernst & Young's 2008 global information security survey. [WWW document] http://www.ey.com/Global/assets.nsf/International/TSRS-Global-Information- Security-Survey-2008/$file/TSRS-Global-Information-Security-Survey-2008. pdf (accessed 1 April 2009).
    • ERNST and YOUNG (2008) Moving beyond compliance: Ernst & Young's 2008 global information security survey. [WWW document] http://www.ey.com/Global/assets.nsf/International/TSRS-Global-Information- Security-Survey-2008/$file/TSRS-Global-Information-Security-Survey-2008. pdf (accessed 1 April 2009).
  • 3
    • 84976755166 scopus 로고    scopus 로고
    • FARHOOMAND A.F. (1987) Scientific progress of management information systems. The DATA BASE for Advances in Information Systems 18(4), 48-56.
    • FARHOOMAND A.F. (1987) Scientific progress of management information systems. The DATA BASE for Advances in Information Systems 18(4), 48-56.
  • 4
    • 0003082268 scopus 로고    scopus 로고
    • A historiographical examination of information systems
    • FARHOOMAND A.F. and DRURY D.H. (1999) A historiographical examination of information systems. Communications of the AIS 1, 1-27.
    • (1999) Communications of the AIS , vol.1 , pp. 1-27
    • FARHOOMAND, A.F.1    DRURY, D.H.2
  • 6
    • 33751161222 scopus 로고    scopus 로고
    • A longitudinal study of information systems threat categories: The enduring problem of human error
    • IM G. and BASKERVILLE R. (2005) A longitudinal study of information systems threat categories: the enduring problem of human error. The DATA BASE for Advances in Information Systems 36(4), 68-79.
    • (2005) The DATA BASE for Advances in Information Systems , vol.36 , Issue.4 , pp. 68-79
    • IM, G.1    BASKERVILLE, R.2
  • 7
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • LOCH K.D., CARR H.H. and WARKENTIN M.E. (1992) Threats to information systems: today's reality, yesterday's understanding. MIS Quarterly 16(2), 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • LOCH, K.D.1    CARR, H.H.2    WARKENTIN, M.E.3
  • 11
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • STRAUB D. and WELKE R. (1998) Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22(4), 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • STRAUB, D.1    WELKE, R.2
  • 12
    • 0036754514 scopus 로고    scopus 로고
    • Research in information systems: An empirical study of diversity in the discipline and its journals
    • VESSEY I., RAMESH V. and GLASS R.L. (2002) Research in information systems: an empirical study of diversity in the discipline and its journals. Journal of Management Information Systems 19(2), 129-174.
    • (2002) Journal of Management Information Systems , vol.19 , Issue.2 , pp. 129-174
    • VESSEY, I.1    RAMESH, V.2    GLASS, R.L.3
  • 13
    • 84905713906 scopus 로고
    • Information system security and privacy
    • HANSoN J, Ed, Ablex Publishing, Norwood, NJ
    • WARKENTIN M.E. (1995) Information system security and privacy. In Emerging Information Technologies, Advances in Telematics HANSoN J, Ed), Volume 2, pp. 57-77, Ablex Publishing, Norwood, NJ.
    • (1995) Emerging Information Technologies, Advances in Telematics , vol.2 , pp. 57-77
    • WARKENTIN, M.E.1
  • 14
    • 85106113141 scopus 로고    scopus 로고
    • IT governance and organizational development for security management
    • STRAUB D, GOODMAN Sand BASKERVILLE RL, Eds, pp, M.E. Sharpe, Armonk, NY
    • WARKENTIN M. and JOHNSTON A.C. (2008) IT governance and organizational development for security management. In Information Security Policies and Practices STRAUB D, GOODMAN Sand BASKERVILLE RL, Eds), pp. 46-68, M.E. Sharpe, Armonk, NY.
    • (2008) Information Security Policies and Practices , pp. 46-68
    • WARKENTIN, M.1    JOHNSTON, A.C.2
  • 15
    • 2642569127 scopus 로고    scopus 로고
    • Introducing the check-off password system (COPS): An advancement in user authentication methods and information security
    • WARKENTIN M., DAVIS K. and BEKKERING E. (2004) Introducing the check-off password system (COPS): an advancement in user authentication methods and information security. Journal of Organizational and End User Computing 16(3), 41-58.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 41-58
    • WARKENTIN, M.1    DAVIS, K.2    BEKKERING, E.3
  • 16
    • 33750683067 scopus 로고    scopus 로고
    • Understanding the perpetration of employee computer crime in the organisational context
    • WILLISON R. (2006) Understanding the perpetration of employee computer crime in the organisational context. Information and Organization 16(4), 304-324.
    • (2006) Information and Organization , vol.16 , Issue.4 , pp. 304-324
    • WILLISON, R.1
  • 18
    • 33749351964 scopus 로고    scopus 로고
    • Opportunities for computer abuse: Considering systems risk from the offender's perspective
    • WILLISON R. and BACKHOUSE J. (2006) Opportunities for computer abuse: considering systems risk from the offender's perspective. European Journal of Information Systems 15(4), 403-414.
    • (2006) European Journal of Information Systems , vol.15 , Issue.4 , pp. 403-414
    • WILLISON, R.1    BACKHOUSE, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.