메뉴 건너뛰기




Volumn 24, Issue 1, 2009, Pages 557-596

Current state of information security research in IS

Author keywords

Computer crime; Computer viruses; Hacking; Information security; Intrusion detection systems; Network security; Password protection; Privacy; Security management; Security models; Spyware

Indexed keywords

COMPUTER CRIME; COMPUTER PRIVACY; COMPUTER VIRUSES; DATA PRIVACY; INFORMATION MANAGEMENT; INTRUSION DETECTION; MALWARE; PERSONAL COMPUTING; SECURITY OF DATA;

EID: 70349309259     PISSN: 15293181     EISSN: None     Source Type: Journal    
DOI: 10.17705/1cais.02434     Document Type: Article
Times cited : (66)

References (178)
  • 1
    • 0038344285 scopus 로고
    • An investigation of keypad interface security
    • Adams, D. A. and S. Y. Chang. (1993). An Investigation of Keypad Interface Security, Information & Management (24). 53-59.
    • (1993) Information & Management , vol.24 , pp. 53-59
    • Adams, D.A.1    Chang, S.Y.2
  • 2
    • 70349371776 scopus 로고
    • Security of statistical databases with an output perturbation technique
    • Adam N. and D. H. Jones. (1989). Security of Statistical Databases with an Output Perturbation Technique, Journal of Management Information Systems (6)1. 101-110.
    • (1989) Journal of Management Information Systems , vol.6 , Issue.1 , pp. 101-110
    • Adam, N.1    Jones, D.H.2
  • 4
    • 33749617452 scopus 로고    scopus 로고
    • Clarifying the effects of internet monitoring on job attitudes: The mediating role of employee trust
    • Alder, G. S., T. W. Noel, and M. L. Ambrose. (2006). Clarifying the Effects of Internet Monitoring on Job Attitudes: The Mediating Role of Employee Trust, Information & Management (43). 894-903.
    • (2006) Information & Management , vol.43 , pp. 894-903
    • Alder, G.S.1    Noel, T.W.2    Ambrose, M.L.3
  • 5
    • 0038544668 scopus 로고    scopus 로고
    • Why we need a new definition of information security
    • Anderson, J. M. (2003). Why We Need a New Definition of Information Security, Computers & Security (22)4. 308-313.
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 308-313
    • Anderson, J.M.1
  • 6
    • 70349359537 scopus 로고    scopus 로고
    • Ethics and morality: A business opportunity for the amoral?
    • Angell, I. (2007). Ethics and Morality: A Business Opportunity for the Amoral?, Journal of Information System Security (3)1. 3-18.
    • (2007) Journal of Information System Security , vol.3 , Issue.1 , pp. 3-18
    • Angell, I.1
  • 7
    • 0036644509 scopus 로고    scopus 로고
    • Computer monitoring: Benefits and pitfalls facing management
    • Ariss, S. S. (2002) Computer Monitoring: Benefits and Pitfalls Facing Management Information & Management (39). 553-558.
    • (2002) Information & Management , vol.39 , pp. 553-558
    • Ariss, S.S.1
  • 9
    • 70349362909 scopus 로고    scopus 로고
    • SoapSY: Unifying security data from various heterogeneous distributed systems into a single database architecture
    • Avourdiadis, N., A. Blyth, and P. Thomas. (2005). SoapSY: Unifying Security Data from Various Heterogeneous Distributed Systems into a Single Database Architecture, Journal of Information System Security (1)2. 26-52.
    • (2005) Journal of Information System Security , vol.1 , Issue.2 , pp. 26-52
    • Avourdiadis, N.1    Blyth, A.2    Thomas, P.3
  • 10
    • 21044453774 scopus 로고    scopus 로고
    • Choice of transaction channels: The effects of product characteristics on market evolution
    • Ba, S. et al. (2005). Choice of Transaction Channels: The Effects of Product Characteristics on Market Evolution, Journal of Management Information Systems (21)4. 173-197.
    • (2005) Journal of Management Information Systems , vol.21 , Issue.4 , pp. 173-197
    • Ba, S.1    Al, E.2
  • 11
    • 84888300769 scopus 로고    scopus 로고
    • Rating certificate authorities: A market approach to the lemons problem
    • Backhouse, J., J. Baptista, and C. Hsu. (2006a). Rating Certificate Authorities: A Market Approach to the Lemons Problem, Journal of Information System Security (2)2. 3-14.
    • (2006) Journal of Information System Security , vol.2 , Issue.2 , pp. 3-14
    • Backhouse, J.1    Baptista, J.2    Hsu, C.3
  • 12
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibility and security of information systems
    • Backhouse, J. and G. Dhillon. (1996). Structures of Responsibility and Security of Information Systems, European Journal of Information Systems (5). 2-9.
    • (1996) European Journal of Information Systems , vol.5 , pp. 2-9
    • Backhouse, J.1    Dhillon, G.2
  • 13
    • 33846027847 scopus 로고    scopus 로고
    • Circuits of power in creating de jure standards: Shaping an international information systems security standard
    • Backhouse, J., C. W. Hsu, and L. Silva. (2006b). Circuits of Power in Creating De Jure Standards: Shaping an International Information Systems Security Standard, Management Information Systems Quarterly (30). 413-438.
    • (2006) Management Information Systems Quarterly , vol.30 , pp. 413-438
    • Backhouse, J.1    Hsu, C.W.2    Silva, L.3
  • 15
    • 0006372914 scopus 로고    scopus 로고
    • A study of senior information systems managers decision models in adopting new computer architecture
    • Paper 4
    • Bajaj, A. (2000). A Study of Senior Information Systems Managers Decision Models in Adopting New Computer Architecture, Journal of the Association for Information Systems (1) Paper 4. 1-55.
    • (2000) Journal of the Association for Information Systems , vol.1 , pp. 1-55
    • Bajaj, A.1
  • 17
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • Baskerville, R. (1993). Information Systems Security Design Methods: Implications for Information Systems Development, ACM Computing Surveys (25). 375-414.
    • (1993) ACM Computing Surveys , vol.25 , pp. 375-414
    • Baskerville, R.1
  • 18
    • 48949090112 scopus 로고    scopus 로고
    • Information Warfare: A Comparative Framework for Business Information Security
    • Baskerville, R. (2005). Information Warfare: A Comparative Framework for Business Information Security, Journal of Information System Security (1)1. 23-50.
    • (2005) Journal of Information System Security , vol.1 , Issue.1 , pp. 23-50
    • Baskerville, R.1
  • 19
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Bass, T. (2000). Intrusion Detection Systems and Multisensor Data Fusion, Communications of the ACM (43)2. 99-105.
    • (2000) Communications of the ACM , vol.43 , Issue.2 , pp. 99-105
    • Bass, T.1
  • 21
    • 84867973432 scopus 로고    scopus 로고
    • Trustworthiness in electronic commerce: The role of privacy, security, and site attributes
    • Belanger, F., J. S Hiller, and W. J. Smith. (2004). Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes, The Journal of Strategic Information Systems (11)3-4.245-270.
    • (2004) The Journal of Strategic Information Systems , vol.11 , Issue.3-4 , pp. 245-270
    • Belanger, F.1    Hiller, J.S.2    Smith, W.J.3
  • 22
    • 1242331196 scopus 로고    scopus 로고
    • The identity crisis within the IS discipline: Defining and communicating the disciplines core properties
    • Benbasat, I. and R. W. Zmud. (2003). The Identity Crisis Within the IS Discipline: Defining and Communicating the Disciplines Core Properties, Management Information Systems Quarterly (27)2. 183-194.
    • (2003) Management Information Systems Quarterly , vol.27 , Issue.2 , pp. 183-194
    • Benbasat, I.1    Zmud, R.W.2
  • 24
    • 9744258059 scopus 로고    scopus 로고
    • Inducing sensitivity to deception in order to improve decision making performance: A field study
    • Biros, D., J. F. George, and R. W. Zmud. (2002). Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study, Management Information Systems Quarterly (26)2. 119-144.
    • (2002) Management Information Systems Quarterly , vol.26 , Issue.2 , pp. 119-144
    • Biros, D.1    George, J.F.2    Zmud, R.W.3
  • 27
    • 0023397555 scopus 로고
    • Security and integrity controls for microcomputers: A summary analysis
    • Boockholdt J. L. (1987). Security and Integrity Controls for Microcomputers: A Summary Analysis, Information & Management (13). 33-41.
    • (1987) Information & Management , vol.13 , pp. 33-41
    • Boockholdt, J.L.1
  • 28
    • 0039935773 scopus 로고
    • Implementing security and integrity in micro-mainframe networks
    • Boockholdt, J. L. (1989). Implementing Security and Integrity in Micro-Mainframe Networks, Management Information Systems Quarterly (13)2. 134-144.
    • (1989) Management Information Systems Quarterly , vol.13 , Issue.2 , pp. 134-144
    • Boockholdt, J.L.1
  • 29
  • 31
    • 0019651520 scopus 로고
    • Treating data privacy in distributed systems
    • Bussolati U. and G. Martella. (1981). Treating Data Privacy in Distributed Systems, Information & Management (4). 305-315.
    • (1981) Information & Management , vol.4 , pp. 305-315
    • Bussolati, U.1    Martella, G.2
  • 32
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K. et al. (2003). The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market, Journal of Computer Security (11)3. 431-448.
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Al, E.2
  • 33
    • 70349350220 scopus 로고    scopus 로고
    • Security consistency in information ecosystems: Structuring the risk environment on the internet
    • Carlsson, B. and A. Jacobsson. (2006). Security Consistency in Information Ecosystems: Structuring the Risk Environment on the Internet, Journal of Information System Security (2)1. 3-26.
    • (2006) Journal of Information System Security , vol.2 , Issue.1 , pp. 3-26
    • Carlsson, B.1    Jacobsson, A.2
  • 34
    • 0019536066 scopus 로고
    • Information as a corporate asset
    • Cattela, R. C. (1981).Information as a Corporate Asset, Information & Management (4). 29-37.
    • (1981) Information & Management , vol.4 , pp. 29-37
    • Cattela, R.C.1
  • 35
    • 7444242205 scopus 로고    scopus 로고
    • The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
    • Cavusoglu, H., M. Birendra, and S. Raghunathan. (2004a). The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers, International Journal of Electronic Commerce (9)1. 69-104.
    • (2004) International Journal of Electronic Commerce , vol.9 , Issue.1 , pp. 69-104
    • Cavusoglu, H.1    Birendra, M.2    Raghunathan, S.3
  • 36
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu, H., M. Birendra, and S. Raghunathan. (2005). The Value of Intrusion Detection Systems in Information Technology Security Architecture, Information Systems Research (16)1. 28-46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Birendra, M.2    Raghunathan, S.3
  • 38
    • 84888302174 scopus 로고    scopus 로고
    • How secure is your password? an analysis of e-commerce passwords and their crack times
    • Cazier, J. and B. D. Medlin. (2006). How Secure Is Your Password? An Analysis of E-Commerce Passwords and Their Crack Times, Journal of Information System Security (2)3. 69-82.
    • (2006) Journal of Information System Security , vol.2 , Issue.3 , pp. 69-82
    • Cazier, J.1    Medlin, B.D.2
  • 39
    • 39749171832 scopus 로고    scopus 로고
    • An economic model of privacy: A property rights approach to regulatory choices for online personalization
    • Chellappa, R. K. and S. Shivendu. (2007). An Economic Model of Privacy: A Property Rights Approach to Regulatory Choices for Online Personalization, Journal of Management Information Systems (24)3. 193-225.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.3 , pp. 193-225
    • Chellappa, R.K.1    Shivendu, S.2
  • 42
    • 70349354773 scopus 로고
    • Improvements in database concurrency control with locking
    • Croker, A. (1987). Improvements in Database Concurrency Control with Locking, Journal of Management Information Systems (4)2. 74-92.
    • (1987) Journal of Management Information Systems , vol.4 , Issue.2 , pp. 74-92
    • Croker, A.1
  • 43
    • 23044529606 scopus 로고    scopus 로고
    • Exploring the supply-side of IT Outsourcing: Evaluating the emerging role of application service providers
    • Currie, W. and P. Seltsikas. (2001). Exploring the Supply-Side of IT Outsourcing: Evaluating the Emerging Role of Application Service Providers, European Journal of Information Systems (10). 123-134.
    • (2001) European Journal of Information Systems , vol.10 , pp. 123-134
    • Currie, W.1    Seltsikas, P.2
  • 44
    • 67349284545 scopus 로고    scopus 로고
    • Towards a best fit between organizational security countermeasures and information systems misuse behaviors
    • DArcy, J. and A. Hovav. (2007). Towards a Best Fit Between Organizational Security Countermeasures and Information Systems Misuse Behaviors, Journal of Information System Security (3)2. 3-30.
    • (2007) Journal of Information System Security , vol.3 , Issue.2 , pp. 3-30
    • Darcy, J.1    Hovav, A.2
  • 46
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Sep
    • Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, Management Information Systems Quarterly, Sep.
    • (1989) Management Information Systems Quarterly
    • Davis, F.D.1
  • 47
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G. and J. Backhouse. (2001). Current Directions in IS Security Research: Towards Socio-Organizational Perspectives, Information Systems Journal (11)2. 127-153.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 48
    • 84888308167 scopus 로고    scopus 로고
    • To opt on, or to opt out? this is the question: A case study
    • Dhillon, G. and S. Chapman. (2007). To Opt On, or to Opt Out? ThIs Is the Question: A Case Study, Journal of Information System Security (2) 2. 46-55.
    • (2007) Journal of Information System Security , vol.2 , Issue.2 , pp. 46-55
    • Dhillon, G.1    Chapman, S.2
  • 49
    • 33744830087 scopus 로고    scopus 로고
    • Value-focused assessment of information system security in organizations
    • Dhillon, G. and G. Torkzadeh. (2006). Value-Focused Assessment of Information System Security in Organizations, Information Systems Journal (16). 293-314.
    • (2006) Information Systems Journal , vol.16 , pp. 293-314
    • Dhillon, G.1    Torkzadeh, G.2
  • 50
    • 33645133251 scopus 로고    scopus 로고
    • An extended privacy calculus model for e-commerce transactions
    • Dinev, T. and P. Hart. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions, Information Systems Research (17)1. 61-80.
    • (2006) Information Systems Research , vol.17 , Issue.1 , pp. 61-80
    • Dinev, T.1    Hart, P.2
  • 51
    • 49049114397 scopus 로고    scopus 로고
    • The centrality of awareness in the formation of user behavioral intention toward protecting information technologies
    • Dinev, T. and Q. Hu. (2007). The Centrality of Awareness in the Formation of User Behavioral Intention toward Protecting Information Technologies, Journal of the Association for Information Systems (8) 7. 386-408.
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.7 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 52
    • 50849153670 scopus 로고
    • Countdown services: Fire and its aftermath in a computer bureau
    • Duffy, N. M. (1980). Countdown Services: Fire and its Aftermath in a Computer Bureau, Information & Management (3). 103-111.
    • (1980) Information & Management , vol.3 , pp. 103-111
    • Duffy, N.M.1
  • 53
    • 0022052513 scopus 로고
    • Using database machines in embedded computer systems
    • Egyhazy, C. (1985). Using Database Machines in Embedded Computer Systems, Information & Management (8). 197-203.
    • (1985) Information & Management , vol.8 , pp. 197-203
    • Egyhazy, C.1
  • 54
    • 70349346927 scopus 로고    scopus 로고
    • Influence of the web vendors interventions on privacy-related behaviors in e- commerce
    • Faja, S. and S. Trimi. (2003). Influence of the Web Vendors Interventions on Privacy-Related Behaviors in E- Commerce, Communications of the Association for Information Systems (17). 2-68.
    • (2003) Communications of the Association for Information Systems , vol.17 , pp. 2-68
    • Faja, S.1    Trimi, S.2
  • 55
    • 33748632891 scopus 로고    scopus 로고
    • Moderating effects of task type on wireless technology acceptance
    • Fang, X. et al. (2005). Moderating Effects of Task Type on Wireless Technology Acceptance, Journal of Management Information Systems (22)3. 123-157.
    • (2005) Journal of Management Information Systems , vol.22 , Issue.3 , pp. 123-157
    • Fang, X.1    Al, E.2
  • 56
    • 70349351913 scopus 로고    scopus 로고
    • Moving towards mobile third generation telecommunication standards: The good and bad of the anytime/anywhere solutions
    • Article 3
    • Fjermestad, J. et al. (2006). Moving Towards Mobile Third Generation Telecommunication Standards: The Good and Bad of the Anytime/Anywhere Solutions, Communications of the Association for Information Systems (17). Article 3. 2-33.
    • (2006) Communications of the Association for Information Systems , vol.17 , pp. 2-33
    • Fjermestad, J.1    Al, E.2
  • 57
    • 0040661360 scopus 로고
    • Security-related behavior of pc users in organizations
    • Frank, J., B. Shamir, and W. Briggs. (1991). Security-Related Behavior of PC Users in Organizations, Information & Management (21). 127-135.
    • (1991) Information & Management , vol.21 , pp. 127-135
    • Frank, J.1    Shamir, B.2    Briggs, W.3
  • 58
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E. and A. Ghose. (2005). The Economic Incentives for Sharing Security Information, Information Systems Research (16)2. 186-208.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 59
    • 34247541615 scopus 로고    scopus 로고
    • Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information
    • Garfinkel, R., R. Gopal, and S. Thompson. (2007). Releasing Individually Identifiable Microdata with Privacy Protection against Stochastic Threat: An Application to Health Information, Information Systems Research (18)1. 23-41.
    • (2007) Information Systems Research , vol.18 , Issue.1 , pp. 23-41
    • Garfinkel, R.1    Gopal, R.2    Thompson, S.3
  • 60
    • 0005766289 scopus 로고    scopus 로고
    • Morality and computers: Attitudes and differences in moral judgments
    • Gattiker, U. and H. Kelley. (1999). Morality and Computers: Attitudes and Differences in Moral Judgments, Information Systems Research (10)3. 233-254.
    • (1999) Information Systems Research , vol.10 , Issue.3 , pp. 233-254
    • Gattiker, U.1    Kelley, H.2
  • 61
    • 0001823869 scopus 로고
    • Security concerns of system users. A study of perceptions of the adequacy of security
    • Goodhue, D. L. and D. W. Straub. (1991). Security Concerns of System Users. A Study of Perceptions of the Adequacy of Security, Information & Management (20). 13-27.
    • (1991) Information & Management , vol.20 , pp. 13-27
    • Goodhue, D.L.1    Straub, D.W.2
  • 63
    • 70349361004 scopus 로고    scopus 로고
    • Managing information security: Demystifying the audit process for security officers
    • Goel, S., D. Pon, and H. Weistroffer. (2006). Managing Information Security: Demystifying the Audit Process for Security Officers, Journal of Information System Security (2)2. 25-44.
    • (2006) Journal of Information System Security , vol.2 , Issue.2 , pp. 25-44
    • Goel, S.1    Pon, D.2    Weistroffer, H.3
  • 64
    • 81055156821 scopus 로고    scopus 로고
    • Global sourcing of it sources and information security: Prudence before playing
    • article 50
    • Goodman, S. E., and R. Ramer. (2007). Global Sourcing of IT Sources and Information Security: Prudence before Playing, Communications of the Association for Information System (20) article 50. 812-823.
    • (2007) Communications of the Association for Information System , vol.20 , pp. 812-823
    • Goodman, S.E.1    Ramer, R.2
  • 66
    • 1242331022 scopus 로고    scopus 로고
    • Digital signature: Use and modification to achieve success in next generational e-business processes
    • Gupta, A., Y. A. Tung, and J. R. Marsden. (2004). Digital Signature: Use and Modification to Achieve Success in Next Generational E-business Processes, Information & Management (41). 561-575.
    • (2004) Information & Management , vol.41 , pp. 561-575
    • Gupta, A.1    Tung, Y.A.2    Marsden, J.R.3
  • 67
    • 84888294731 scopus 로고    scopus 로고
    • Building user authentication in an -organizational information system
    • Halonen, R. (2006). Building User Authentication in an -Organizational Information System, Journal of Information System Security (2)3. 49-68.
    • (2006) Journal of Information System Security , vol.2 , Issue.3 , pp. 49-68
    • Halonen, R.1
  • 68
    • 0017552931 scopus 로고
    • A forecast of the future of computation
    • Hammer, C. (1977). A Forecast of the Future of Computation, Information & Management (1). 3-10.
    • (1977) Information & Management , vol.1 , pp. 3-10
    • Hammer, C.1
  • 69
    • 0024056671 scopus 로고
    • Is todays office receiving full value from its computers?
    • Hammer, C. (1988). Is Todays Office Receiving Full Value from its Computers? Information & Management (15). 15-23.
    • (1988) Information & Management , vol.15 , pp. 15-23
    • Hammer, C.1
  • 70
    • 33744529638 scopus 로고    scopus 로고
    • Evolutionary neural networks for anomaly detection based on the behavior of a program
    • Han, S., and S. Cho. (2006). Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program, IEEE Transactions on Systems, Man, and Cybernetics -Part B: Cybernetics. (36)3. 559-570.
    • (2006) IEEE Transactions on Systems, Man, and Cybernetics -Part B: Cybernetics , vol.36 , Issue.3 , pp. 559-570
    • Han, S.1    Cho, S.2
  • 71
    • 38349195111 scopus 로고    scopus 로고
    • Overcoming online information privacy concerns: An information-processing theory approach
    • Hann, I. et al. (2007). Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach, Journal of Management Information Systems (24)2. 13-42.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.2 , pp. 13-42
    • Hann, I.1    Al, E.2
  • 72
    • 0000917858 scopus 로고    scopus 로고
    • The effect of code of ethics and personal denial of responsibility on computer abuse judgments and intentions
    • Harrington, S. (1996). The Effect of Code of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions, Management Information Systems Quarterly (20)3. 257-278.
    • (1996) Management Information Systems Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.1
  • 73
    • 0038442927 scopus 로고    scopus 로고
    • Payments and banking with mobile personal devices
    • Herzberg, A. (2003). Payments and Banking with Mobile Personal Devices, Communications of the ACM (46)5. 53-58.
    • (2003) Communications of the ACM , vol.46 , Issue.5 , pp. 53-58
    • Herzberg, A.1
  • 74
    • 33847712553 scopus 로고    scopus 로고
    • The value of privacy assurance: An exploratory field experiment
    • Hui, K., H. H. Teo, and S. T. Lee. (2007). The Value of Privacy Assurance: An Exploratory Field Experiment, Management Information Systems Quarterly (31)1. 19-33.
    • (2007) Management Information Systems Quarterly , vol.31 , Issue.1 , pp. 19-33
    • Hui, K.1    Teo, H.H.2    Lee, S.T.3
  • 75
    • 84876477338 scopus 로고    scopus 로고
    • IBM, current as of Nov
    • IBM. (2006). IBM Information Security Reference Model, web.esaugumas.lt/storage/conference2006/IBM-ISF%20presentation. %2016-17%20Nov%202006%20(RRT). pps (current as of Nov. 7, 2008).
    • (2006) , vol.7 , pp. 2008
  • 76
    • 0000460271 scopus 로고
    • Software piracy and software security measures in business schools
    • Im, J. H. and P. D. V. Epps. (1992). Software Piracy and Software Security Measures in Business Schools, Information & Management (23). 193-203.
    • (1992) Information & Management , vol.23 , pp. 193-203
    • Im, J.H.1    Epps, P.D.V.2
  • 77
    • 85026967297 scopus 로고    scopus 로고
    • Anything you search can be used against you in a court of law: Data mining in search archives
    • Article 29
    • Ives, B. and V. Krotov. (2006). Anything You Search Can Be Used against You in a Court of Law: Data Mining in Search Archives, Communications of the Association for Information Systems (18). Article 29. 1-28.
    • (2006) Communications of the Association for Information Systems , vol.18 , pp. 1-28
    • Ives, B.1    Krotov, V.2
  • 79
    • 84876478293 scopus 로고    scopus 로고
    • Home Page , current as of Nov. 7, 2008
    • JISSEC. (2008). Home Page www.jissec.org (current as of Nov. 7, 2008).
    • (2008)
  • 80
    • 2342465798 scopus 로고
    • Computer infectors. prevention, detection, and recovery
    • Joseph, G. W. and J. E. Blanton. (1992). Computer Infectors. Prevention, Detection, and Recovery, Information & Management (23). 205-216.
    • (1992) Information & Management , vol.23 , pp. 205-216
    • Joseph, G.W.1    Blanton, J.E.2
  • 82
    • 33748577182 scopus 로고    scopus 로고
    • The effects of trust-assuring arguments on consumer trust in internet stores: Application of toulmins model of argumentation
    • Kim, D. and I. Benbasat. (2006). The Effects of Trust-Assuring Arguments on Consumer Trust in Internet Stores: Application of Toulmins Model of Argumentation, Information Systems Research (17)3. 286-300.
    • (2006) Information Systems Research , vol.17 , Issue.3 , pp. 286-300
    • Kim, D.1    Benbasat, I.2
  • 83
    • 19744375669 scopus 로고    scopus 로고
    • A Comparison of online trust building factors between potential customers and repeat customers
    • Kim, H-W., Y. Xu and K. Koh. (2004b). A Comparison of Online Trust Building Factors between Potential Customers and Repeat Customers, Journal of the Association for Information Systems (5) 10. 392-420.
    • (2004) Journal of the Association for Information Systems , vol.5 , Issue.10 , pp. 392-420
    • Kim, H.-W.1    Xu, Y.2    Koh, K.3
  • 84
    • 0036737203 scopus 로고    scopus 로고
    • Businesses as buildings: Metrics for the architectural quality of internet businesses
    • Kim, J. et al. (2002). Businesses as Buildings: Metrics for the Architectural Quality of Internet Businesses, Information Systems Research (13)3. 239-254.
    • (2002) Information Systems Research , vol.13 , Issue.3 , pp. 239-254
    • Kim, J.1    Al, E.2
  • 85
    • 33845709033 scopus 로고    scopus 로고
    • Defense mechanisms of biological cells: A framework for network security thinking
    • Knapp, K. et al. (2003). Defense Mechanisms of Biological Cells: A Framework for Network Security Thinking, Communications of the Association for Information Systems (12). 701-719.
    • (2003) Communications of the Association for Information Systems , vol.12 , pp. 701-719
    • Knapp, K.1    Al, E.2
  • 86
    • 0011784143 scopus 로고    scopus 로고
    • Data management in executive information systems
    • Koh, C. E. and H. J. Watson. (1998). Data Management in Executive Information Systems, Information & Management (33). 301-312.
    • (1998) Information & Management , vol.33 , pp. 301-312
    • Koh, C.E.1    Watson, H.J.2
  • 88
    • 1242263532 scopus 로고    scopus 로고
    • Why there arent more information security research studies
    • Kotulic, A. G. and J. G. Clark. (2004). Why There Arent More Information Security Research Studies, Information & Management (41). 597-607.
    • (2004) Information & Management , vol.41 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 89
    • 1442328144 scopus 로고    scopus 로고
    • Business use of internet-based information systems: The case of korea
    • Lee, S. (2003). Business Use of Internet-Based Information Systems: The Case of Korea, European Journal of Information Systems (12). 168-181.
    • (2003) European Journal of Information Systems , vol.12 , pp. 168-181
    • Lee, S.1
  • 90
    • 1442303690 scopus 로고    scopus 로고
    • Development of a measure for the information technology infrastructure construct
    • Lewis, B. R. and T. A. Byrd. (2003). Development of a Measure for the Information Technology Infrastructure Construct, European Journal of Information Systems (12). 93-109.
    • (2003) European Journal of Information Systems , vol.12 , pp. 93-109
    • Lewis, B.R.1    Byrd, T.A.2
  • 91
  • 92
    • 36549085110 scopus 로고    scopus 로고
    • An active learning based TCM-KNN algorithm for supervised network intrusion detection
    • DOI 10.1016/j.cose.2007.10.002, PII S0167404807001101
    • Li, Y. and L. Guo. (2007). An Active Learning Based TCM-KNN Algorithm for Supervised Network Intrusion Detection, Computers & Security (26) 7-8. 459-467. (Pubitemid 350191973)
    • (2007) Computers and Security , vol.26 , Issue.7-8 , pp. 459-467
    • Li, Y.1    Guo, L.2
  • 93
    • 33748519577 scopus 로고    scopus 로고
    • Privacy protection in data mining: A perturbation approach for categorical data
    • Li, X. and S. Sarkar. (2004). Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data, Information Systems Research (17)3. 254-270.
    • (2004) Information Systems Research , vol.17 , Issue.3 , pp. 254-270
    • Li, X.1    Sarkar, S.2
  • 95
    • 84974774507 scopus 로고
    • Towards operational measures of computer security
    • Littlewood, B. et al. (1993). Towards Operational Measures of Computer Security, Journal of Computer Security 2(3). 211-229.
    • (1993) Journal of Computer Security , vol.2 , Issue.3 , pp. 211-229
    • Littlewood, B.1    Al, E.2
  • 96
    • 0000133760 scopus 로고
    • Threats to information systems: Todays reality, yesterdays understanding
    • Loch, K. D., H. C. Carr, and M. E. Warkentin. (1992). Threats to Information Systems: Todays Reality, Yesterdays Understanding, Management Information Systems Quarterly (16)2. 173-186.
    • (1992) Management Information Systems Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.C.2    Warkentin, M.E.3
  • 97
    • 84888291317 scopus 로고
    • Designing financial information systems for auditability
    • Lockman A. and N. Minsky. (1989). Designing Financial Information Systems for Auditability, Journal of Management Information Systems (1)1. 50-62.
    • (1989) Journal of Management Information Systems , vol.1 , Issue.1 , pp. 50-62
    • Lockman, A.1    Minsky, N.2
  • 98
    • 34250013494 scopus 로고    scopus 로고
    • E-commerce adoption in brunei darussalam: A quantitative analysis of factors influencing its adoption
    • Looi, H. C. (2005). E-Commerce Adoption in Brunei Darussalam: A Quantitative Analysis of Factors Influencing its Adoption, Communications of the Association for Information Systems (15). 61-81.
    • (2005) Communications of the Association for Information Systems , vol.15 , pp. 61-81
    • Looi, H.C.1
  • 99
    • 0022235191 scopus 로고
    • Social security administrations progress in modernizing its computer operations
    • Lucas, H. C. (1985). Social Security Administrations Progress in Modernizing its Computer Operations, Information & Management (9). 283-290.
    • (1985) Information & Management , vol.9 , pp. 283-290
    • Lucas, H.C.1
  • 101
    • 13244298307 scopus 로고    scopus 로고
    • Internet users information privacy concerns (IUIPC): The construct, the scale, and a causal model
    • Malhotra N., S. S. Kim, and J. Agarwal. (2004). Internet Users Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research (15)4. 336-355.
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.1    Kim, S.S.2    Agarwal, J.3
  • 102
    • 70349350219 scopus 로고    scopus 로고
    • Anchoring information security governance research: Sociological groundings and future directions
    • McFadzean, E., J. Ezingeard, and D. Birchall. (2006). Anchoring Information Security Governance Research: Sociological Groundings and Future Directions, Journal of Information System Security (2)3. 3-47.
    • (2006) Journal of Information System Security , vol.2 , Issue.3 , pp. 3-47
    • McFadzean, E.1    Ezingeard, J.2    Birchall, D.3
  • 103
    • 33749316921 scopus 로고    scopus 로고
    • Adding clicks to bricks: A case study of e-commerce adoption by a catalan small retailer
    • Molla, A., R. Heeks, and I. Balcells. (2006). Adding Clicks to Bricks: A Case Study of E-Commerce Adoption by a Catalan Small Retailer, European Journal of Information Systems (15). 424-438.
    • (2006) European Journal of Information Systems , vol.15 , pp. 424-438
    • Molla, A.1    Heeks, R.2    Balcells, I.3
  • 104
    • 84888308191 scopus 로고    scopus 로고
    • Towards a global framework for corporate and enterprise digital policy management
    • Morin, J-H. and M. Pawlak. (2006). Towards a Global Framework for Corporate and Enterprise Digital Policy Management, Journal of Information System Security (2)2. 15-24.
    • (2006) Journal of Information System Security , vol.2 , Issue.2 , pp. 15-24
    • Morin, J.-H.1    Pawlak, M.2
  • 105
    • 64949173653 scopus 로고    scopus 로고
    • Security issues and capabilities of mobile brokerage services and infrastructures
    • Muntermann, J. and R. Heiko. (2006). Security Issues and Capabilities of Mobile Brokerage Services and Infrastructures, Journal of Information System Security (2)1. 27-43.
    • (2006) Journal of Information System Security , vol.2 , Issue.1 , pp. 27-43
    • Muntermann, J.1    Heiko, R.2
  • 106
    • 0018519452 scopus 로고
    • Cryptographic transformation of data relationships
    • Murray, T. J. (1979). Cryptographic Transformation of Data Relationships, Information & Management (2). 95-98.
    • (1979) Information & Management , vol.2 , pp. 95-98
    • Murray, T.J.1
  • 108
    • 84888302909 scopus 로고    scopus 로고
    • The effect of spam and privacy concerns on e-mail users behavior
    • Park, I. et al. (2007). The Effect of Spam and Privacy Concerns on E-Mail Users Behavior, Journal of Information System Security (3)1. 39-62.
    • (2007) Journal of Information System Security , vol.3 , Issue.1 , pp. 39-62
    • Park, I.1    Al, E.2
  • 109
    • 0036469651 scopus 로고    scopus 로고
    • Wanted: More network-security graduates and research
    • Paulson, L. D. (2002). Wanted: More Network-Security Graduates and Research, Computer (35)2. 22-24.
    • (2002) Computer , vol.35 , Issue.2 , pp. 22-24
    • Paulson, L.D.1
  • 110
    • 33847764616 scopus 로고    scopus 로고
    • Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective
    • Pavlou, P. A., H. Liang, and Y. Xue. (2007). Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective, Management Information Systems Quarterly (31)1. 105-136.
    • (2007) Management Information Systems Quarterly , vol.31 , Issue.1 , pp. 105-136
    • Pavlou, P.A.1    Liang, H.2    Xue, Y.3
  • 111
    • 0036116939 scopus 로고    scopus 로고
    • On the security of open source software
    • Payne, C. (2002). On the Security of Open Source Software, Information Systems Journal (12). 61-78.
    • (2002) Information Systems Journal , vol.12 , pp. 61-78
    • Payne, C.1
  • 112
    • 2342631845 scopus 로고    scopus 로고
    • Regulation and information security: Can Y2K lessons help us?
    • Payne, J. E. (2004) Regulation and Information Security: Can Y2K Lessons Help Us?, IEEE Security and Privacy Magazine (2)2. 58-61.
    • (2004) IEEE Security and Privacy Magazine , vol.2 , Issue.2 , pp. 58-61
    • Payne, J.E.1
  • 113
  • 114
    • 39749104751 scopus 로고    scopus 로고
    • A design science research methodology for information systems research
    • Peffers, K. et al. (2007). A Design Science Research Methodology for Information Systems Research, Journal of Management Information Systems (24)3. 45-77.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.3 , pp. 45-77
    • Peffers, K.1    Al, E.2
  • 115
    • 4544230176 scopus 로고    scopus 로고
    • Identifying and evaluating the universe of outlets for information systems research: Ranking the journals
    • Peffers, K. and Y. Tang. (2003). Identifying and Evaluating the Universe of Outlets for Information Systems Research: Ranking the Journals, The Journal of Information Technology Theory and Application (5)1. 63-84.
    • (2003) The Journal of Information Technology Theory and Application , vol.5 , Issue.1 , pp. 63-84
    • Peffers, K.1    Tang, Y.2
  • 117
    • 0041983746 scopus 로고    scopus 로고
    • Management tradeoffs in anti-virus strategies
    • Post, G. and A. Kagan. (2000). Management Tradeoffs in Anti-Virus Strategies, Information & Management (37). 13-24.
    • (2000) Information & Management , vol.37 , pp. 13-24
    • Post, G.1    Kagan, A.2
  • 118
    • 84888294258 scopus 로고    scopus 로고
    • Methodology to assess the impact of investments in security tools and products
    • Ramachandran, S. and G. W. White. (2005). Methodology to Assess the Impact of Investments in Security Tools and Products, Journal of Information System Security (1)2. 3-25.
    • (2005) Journal of Information System Security , vol.1 , Issue.2 , pp. 3-25
    • Ramachandran, S.1    White, G.W.2
  • 119
    • 0036567901 scopus 로고    scopus 로고
    • Key dimension of business-to-consumer web sites
    • Rangnathan, C. and S. Ganapathy. (2002). Key Dimension of Business-to-Consumer Web Sites, Information & Management (39). 457-465.
    • (2002) Information & Management , vol.39 , pp. 457-465
    • Rangnathan, C.1    Ganapathy, S.2
  • 120
    • 1142292685 scopus 로고    scopus 로고
    • Trust in web-based electronic commerce security
    • Ratnasingham, P. (1998). Trust in Web-Based Electronic Commerce Security, Information Management and Computer Security (6)4. 162-166. (Pubitemid 128623422)
    • (1998) Information Management and Computer Security , vol.6 , Issue.4 , pp. 162-166
    • Ratnasingham, P.1
  • 121
    • 84888308485 scopus 로고    scopus 로고
    • A framework to facilitate forensic investigation of falsely advertised bgp routes
    • Ray, I., E. Kim, and D. Massey. (2007). A Framework to Facilitate Forensic Investigation of Falsely Advertised BGP Routes, Journal of Information System Security (3)2. 32-65.
    • (2007) Journal of Information System Security , vol.3 , Issue.2 , pp. 32-65
    • Ray, I.1    Kim, E.2    Massey, D.3
  • 122
    • 84888296171 scopus 로고    scopus 로고
    • Information technology and systems II: Server administration networks
    • Reed, A. (2005). Information Technology and Systems II: Server Administration Networks, Communications of the Association for Information Systems (15). 642-660.
    • (2005) Communications of the Association for Information Systems , vol.15 , pp. 642-660
    • Reed, A.1
  • 123
    • 33846817469 scopus 로고    scopus 로고
    • Biometric attack vectors and defences
    • Roberts, C. (2007). Biometric Attack Vectors and Defences, Computers & Security (26) 1. 14-25.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 14-25
    • Roberts, C.1
  • 124
    • 36549062966 scopus 로고    scopus 로고
    • A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
    • Rodwell, P. M., S. M. Furnell, and P. L. Reynolds. (2007). A Non-Intrusive Biometric Authentication Mechanism Utilising Physiological Characteristics of the Human Head, Computers & Security (26) 7-8. 468-478.
    • (2007) Computers & Security , vol.26 , Issue.7-8 , pp. 468-478
    • Rodwell, P.M.1    Furnell, S.M.2    Reynolds, P.L.3
  • 126
    • 0019534443 scopus 로고
    • Confidentiality of information
    • Roos, H. (1981). Confidentiality of Information, Information & Management (4). 17-21.
    • (1981) Information & Management , vol.4 , pp. 17-21
    • Roos, H.1
  • 127
    • 0031095932 scopus 로고    scopus 로고
    • Evaluating security threats in mainframe and client/server environments
    • Ryan, S. D. and B. Bordoloi. (1997) Evaluating Security Threats in Mainframe and Client/Server Environments, Information & Management (32). 137-146.
    • (1997) Information & Management , vol.32 , pp. 137-146
    • Ryan, S.D.1    Bordoloi, B.2
  • 128
    • 0036909696 scopus 로고    scopus 로고
    • The security of confidential numerical data in databases
    • Sarathy R. and K. Muralidhar. (2002). The Security of Confidential Numerical Data in Databases, Information Systems Research (13)4. 389-403.
    • (2002) Information Systems Research , vol.13 , Issue.4 , pp. 389-403
    • Sarathy, R.1    Muralidhar, K.2
  • 129
    • 84888305837 scopus 로고    scopus 로고
    • Do anti-spam measures effectively cover the e-mail communication network? A formal approach
    • Schryen, G. (2007). Do Anti-Spam Measures Effectively Cover the E-Mail Communication Network? A Formal Approach, Journal of Information System Security (3)2. 66-90.
    • (2007) Journal of Information System Security , vol.3 , Issue.2 , pp. 66-90
    • Schryen, G.1
  • 130
    • 84876461746 scopus 로고    scopus 로고
    • Letter to AIS, Current as of Nov, 7 2008
    • Senior Scholars. (2006) Letter to AIS http://home.aisnet.org/ associations/7499/files/Senior%20Scholars%20Letter.pdf (Current as of Nov. 7, 2008).
    • (2006)
  • 132
    • 84888288567 scopus 로고    scopus 로고
    • WIDS: A wireless intrusion detection system for detecting man-in-the-middle attacks
    • Shanley, R. and G. Premkumar. (2005). WIDS: A Wireless Intrusion Detection System for Detecting Man-in-the-Middle Attacks, Journal of Information System Security (1)3. 18-44.
    • (2005) Journal of Information System Security , vol.1 , Issue.3 , pp. 18-44
    • Shanley, R.1    Premkumar, G.2
  • 133
    • 12244294780 scopus 로고    scopus 로고
    • A transactional-cycle approach to evidence management for dispute resolution
    • Shao, M., J. J. Hwang, and S. Wu. (2005). A Transactional-Cycle Approach to Evidence Management for Dispute Resolution, Information & Management (42). 607-618.
    • (2005) Information & Management , vol.42 , pp. 607-618
    • Shao, M.1    Hwang, J.J.2    Wu, S.3
  • 134
    • 0038682965 scopus 로고    scopus 로고
    • An ASEAN way to security cooperation in southeast asia?
    • Sharpe, S. (2003). An ASEAN Way to Security Cooperation in Southeast Asia? The Pacific Review (16)2 231-250.
    • (2003) The Pacific Review , vol.16 , Issue.2 , pp. 231-250
    • Sharpe, S.1
  • 136
    • 70349350217 scopus 로고    scopus 로고
    • Cell phone tv, wireless networks in disaster management, ubiquitous computing, and adoption of future wireless applications
    • Article 29
    • Shim, J. P. et al. (2007). Cell Phone TV, Wireless Networks in Disaster Management, Ubiquitous Computing, and Adoption of Future Wireless Applications, Communications of the Association for Information Systems (20) Article 29. 1-27.
    • (2007) Communications of the Association for Information Systems , vol.20 , pp. 1-27
    • Shim, J.P.1    Al, E.2
  • 137
    • 30744438863 scopus 로고    scopus 로고
    • An analysis of the traditional is security approaches: Implications for research and practice
    • Siponen, M. T. (2005). An Analysis of the Traditional IS Security Approaches: Implications for Research and Practice, European Journal of Information Systems (14). 303-315.
    • (2005) European Journal of Information Systems , vol.14 , pp. 303-315
    • Siponen, M.T.1
  • 140
    • 84876474983 scopus 로고    scopus 로고
    • current Nov
    • Slevin, C. (2007). After Cyber Attack, Rockies Are Set to Resume Online Ticket Sales, http://www.redorbit.com/news/technology/1114025/rockies-to-try- online-ticket-sales-again/index.html (current Nov. 7, 2008).
    • (2007) After Cyber Attack , vol.7 , pp. 2008
    • Slevin, C.1
  • 141
    • 2342568408 scopus 로고    scopus 로고
    • An exploratory study to identify the critical factors affecting the decision to establish internet-based interorganizational information systems
    • Soliman, K. S. and B. D. Janz. (2004). An Exploratory Study to Identify the Critical Factors Affecting the Decision to Establish Internet-Based Interorganizational Information Systems, Information & Management (41). 697-706.
    • (2004) Information & Management , vol.41 , pp. 697-706
    • Soliman, K.S.1    Janz, B.D.2
  • 142
    • 38149100813 scopus 로고    scopus 로고
    • RFID: A systematic analysis of privacy threat and a seven-point plan to address them
    • Spiekermann, S. and H. Ziekow. (2005). RFID: A Systematic Analysis of Privacy Threat and A Seven-point Plan to Address Them, Journal of Information System Security (1)3. 2-18.
    • (2005) Journal of Information System Security , vol.1 , Issue.3 , pp. 2-18
    • Spiekermann, S.1    Ziekow, H.2
  • 143
    • 84888295876 scopus 로고    scopus 로고
    • Challenges in Managing Information Security in Academic Institutions: Case of MDI India
    • Sridhar, V. and D. K. Ahuja. (2007). Challenges in Managing Information Security in Academic Institutions: Case of MDI India, Journal of Information System Security (3) 3. 51-78.
    • (2007) Journal of Information System Security , vol.3 , Issue.3 , pp. 51-78
    • Sridhar, V.1    Ahuja, D.K.2
  • 145
    • 50749134916 scopus 로고
    • An alternative to emulation for micro-mainframe data exchange
    • Stephens, C. S. and C. A. Snyder. (1991). An Alternative to Emulation for Micro-Mainframe Data Exchange, Information & Management (20). 105-116.
    • (1991) Information & Management , vol.20 , pp. 105-116
    • Stephens, C.S.1    Snyder, C.A.2
  • 146
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D. W. (1990a). Effective IS Security: An Empirical Study, Information Systems Research (1)3. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 147
    • 53349102510 scopus 로고
    • Key information liability issues facing managers: Software piracy, proprietary databases, and individuals rights to privacy
    • Straub, D. W. (1990b). Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individuals Rights to Privacy, Management Information Systems Quarterly (14)2. 143-156.
    • (1990) Management Information Systems Quarterly , vol.14 , Issue.2 , pp. 143-156
    • Straub, D.W.1
  • 148
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • Straub, D. W. and W. D. Nance. (1990). Discovering and Disciplining Computer Abuse in Organizations: A Field Study, Management Information Systems Quarterly (14)1. 45-60.
    • (1990) Management Information Systems Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 149
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W. and R. J. Welke. (1998). Coping with Systems Risk: Security Planning Models for Management Decision Making, Management Information Systems Quarterly (22)4. 441-469.
    • (1998) Management Information Systems Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 150
    • 50849154405 scopus 로고
    • An assessment of alternative application development approaches
    • Sumner, M. R. (1986). An Assessment of Alternative Application Development Approaches, Information & Management (10). 197-206.
    • (1986) Information & Management , vol.10 , pp. 197-206
    • Sumner, M.R.1
  • 151
    • 33748594201 scopus 로고    scopus 로고
    • An information systems security risk assessment model under the dempster-shafer theory of belief functions
    • Sun L., R. P. Srivastava, and T. J. Mock. (2006). An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions, Journal of Management Information Systems (22)4. 109-142.
    • (2006) Journal of Management Information Systems , vol.22 , Issue.4 , pp. 109-142
    • Sun, L.1    Srivastava, R.P.2    Mock, T.J.3
  • 152
    • 4243132179 scopus 로고
    • Measuring user attitudes in MIS research: A review
    • Swanson, E. B. (1982). Measuring User Attitudes in MIS Research: A Review, OMEGA, (10)-157-165.
    • (1982) OMEGA , vol.10 , pp. 157-165
    • Swanson, E.B.1
  • 153
    • 0024606942 scopus 로고
    • Information systems for security trading
    • Tam, K. Y. (1989). Information Systems for Security Trading, Information & Management (16). 105-114.
    • (1989) Information & Management , vol.16 , pp. 105-114
    • Tam, K.Y.1
  • 155
    • 33745839646 scopus 로고
    • Multilevel security for information retrieval systems
    • Thuraisingham, B. (1993). Multilevel Security for Information Retrieval Systems, Information & Management (24). 93-103.
    • (1993) Information & Management , vol.24 , pp. 93-103
    • Thuraisingham, B.1
  • 156
    • 0029207994 scopus 로고
    • Multilevel security for information retrieval systems II
    • Thuraisingham, B. (1995). Multilevel Security for Information Retrieval Systems II, Information & Management (28). 49-61.
    • (1995) Information & Management , vol.28 , pp. 49-61
    • Thuraisingham, B.1
  • 157
    • 0004096846 scopus 로고
    • Cambridge University Press: Cambridge, UK
    • Toulmin, S. E. (1958). The Use of Argument. Cambridge University Press: Cambridge, UK.
    • (1958) The Use of Argument
    • Toulmin, S.E.1
  • 158
    • 70349362902 scopus 로고    scopus 로고
    • On security metaphors and how they shape the emerging practice of secure information systems development
    • Tryfonas, T. (2007). On Security Metaphors and How They Shape the Emerging Practice of Secure Information Systems Development, Journal of Information System Security (3)3. 21-50.
    • (2007) Journal of Information System Security , vol.3 , Issue.3 , pp. 21-50
    • Tryfonas, T.1
  • 159
    • 0018024415 scopus 로고
    • Privacy protection in record-keeping systems
    • Turn, R. (1978). Privacy Protection in Record-Keeping Systems, Information & Management (1). 187-197.
    • (1978) Information & Management , vol.1 , pp. 187-197
    • Turn, R.1
  • 160
    • 15744381377 scopus 로고    scopus 로고
    • Adware/spyware: An update regarding pending litigation and legislation
    • Urbach, R. R. and G. A. Kibel. (2004). Adware/Spyware: An Update Regarding Pending Litigation and Legislation, Intellectual Property & Technology Law Journal, (16)7. 12-16.
    • (2004) Intellectual Property & Technology Law Journal , vol.16 , Issue.7 , pp. 12-16
    • Urbach, R.R.1    Kibel, G.A.2
  • 161
  • 162
    • 2442601796 scopus 로고    scopus 로고
    • Wireless I: Mobile and wireless information systems: Applications, networks, and research problems
    • Varshney, U. (2003). Wireless I: Mobile and Wireless Information Systems: Applications, Networks, and Research Problems, Communications of the Association for Information Systems (12). 155-166.
    • (2003) Communications of the Association for Information Systems , vol.12 , pp. 155-166
    • Varshney, U.1
  • 163
    • 33747216149 scopus 로고    scopus 로고
    • Security policies and the software developer
    • Verdon, D. (2006). Security Policies and the Software Developer, IEEE Security and Privacy Magazine (4)4. 42-49.
    • (2006) IEEE Security and Privacy Magazine , vol.4 , Issue.4 , pp. 42-49
    • Verdon, D.1
  • 164
    • 33845916515 scopus 로고    scopus 로고
    • Perceived risk and trust associated with purchasing at electronic marketplaces
    • Verhagen, T., S. Meents, and Y. Tan. (2006), Perceived Risk and Trust Associated with Purchasing at Electronic Marketplaces, European Journal of Information Systems (15). 542-555.
    • (2006) European Journal of Information Systems , vol.15 , pp. 542-555
    • Verhagen, T.1    Meents, S.2    Tan, Y.3
  • 165
    • 33747053670 scopus 로고    scopus 로고
    • Information security: The fourth wave
    • von Solms, B. (2006). Information Security: The Fourth Wave, Computers & Security (25) 3. 165-168.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 165-168
    • Solms, B.1
  • 166
    • 0141917862 scopus 로고    scopus 로고
    • A framework for information security evaluation
    • von Solms, R. et al. (2005). A Framework for Information Security Evaluation, Information & Management (26). 143-153.
    • (2005) Information & Management , vol.26 , pp. 143-153
    • Von Solms, R.1    Al, E.2
  • 167
    • 0041150947 scopus 로고
    • Information systems management issues in the republic of china for the 1990s
    • Wang, P. (1994). Information Systems Management Issues in the Republic of China for the 1990s, Information & Management (26). 341-352.
    • (1994) Information & Management , vol.26 , pp. 341-352
    • Wang, P.1
  • 169
    • 33749351964 scopus 로고    scopus 로고
    • Opportunities for computer crime: Considering systems risk from a criminological perspective
    • Willison, R. and J. Backhouse. (2006). Opportunities for Computer Crime: Considering Systems Risk from a Criminological Perspective, European Journal of Information Systems (15). 403-414.
    • (2006) European Journal of Information Systems , vol.15 , pp. 403-414
    • Willison, R.1    Backhouse, J.2
  • 170
    • 84876460680 scopus 로고    scopus 로고
    • Wise Geek, Current as of Nov.7
    • Wise Geek, What Is Information Security? www.wisegeek.com/what-is- information-security.htm (Current as of Nov.7, 2008).
    • (2008) What Is Information Security?
  • 173
    • 36549082411 scopus 로고    scopus 로고
    • Mining tcp/ip packets to detect stepping-stone intrusion
    • Yang, J. and S. S. Huang. (2007). Mining TCP/IP Packets to Detect Stepping-Stone Intrusion, Computers & Security (26) 7-8. 479-484.
    • (2007) Computers & Security , vol.26 , Issue.7-8 , pp. 479-484
    • Yang, J.1    Huang, S.S.2
  • 174
    • 84888305306 scopus 로고    scopus 로고
    • An evaluation of size-based traffic feature for intrusion detection
    • Ye, M., G. Premkumar, and D. Zhu. (2007). An Evaluation of Size-Based Traffic Feature for Intrusion Detection, Journal of Information System Security (3)1. 19-38.
    • (2007) Journal of Information System Security , vol.3 , Issue.1 , pp. 19-38
    • Ye, M.1    Premkumar, G.2    Zhu, D.3
  • 175
    • 34447298085 scopus 로고    scopus 로고
    • Threats and countermeasures for information system security: A cross-industry study
    • Yeh, Q. and A. J. Chang. (2007). Threats and Countermeasures for Information System Security: A Cross-Industry Study, Information & Management (44). 480-491.
    • (2007) Information & Management , vol.44 , pp. 480-491
    • Yeh, Q.1    Chang, A.J.2
  • 176
    • 38349147070 scopus 로고    scopus 로고
    • Intrusion prevention in information systems: Reactive and proactive responses
    • Yue W. and M. Cakanyildirim. (2007). Intrusion Prevention in Information Systems: Reactive and Proactive Responses, Journal of Management Information Systems (24)1. 329-353.
    • (2007) Journal of Management Information Systems , vol.24 , Issue.1 , pp. 329-353
    • Yue, W.1    Cakanyildirim, M.2
  • 177


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.