메뉴 건너뛰기




Volumn 28, Issue 7, 2009, Pages 509-520

Human and organizational factors in computer and information security: Pathways to vulnerabilities

Author keywords

Causal Network Analysis; Computer security; Design; Human and organizational factors; Pathways; Red teams; Vulnerabilities

Indexed keywords

CAUSAL NETWORK ANALYSIS; COMPUTER SECURITY; HUMAN AND ORGANIZATIONAL FACTORS; PATHWAYS; RED TEAMS; VULNERABILITIES;

EID: 70349448077     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.04.006     Document Type: Article
Times cited : (158)

References (47)
  • 2
    • 0242444871 scopus 로고    scopus 로고
    • Making passwords secure and usable
    • Thimbleby H., O'Conaill B., and Thomas P. (Eds), Springer, Bristol
    • Adams A., Sasse M.A., and Lunt P. Making passwords secure and usable. In: Thimbleby H., O'Conaill B., and Thomas P. (Eds). People & computers XII, proceedings of HCI'97 (1997), Springer, Bristol 1-19
    • (1997) People & computers XII, proceedings of HCI'97 , pp. 1-19
    • Adams, A.1    Sasse, M.A.2    Lunt, P.3
  • 3
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Albrechtsen E. A qualitative study of users' view on information security. Computers & Security 26 4 (2007) 276-289
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 4
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard D., and Arief B. Computer security impaired by legitimate users. Computers & Security 23 (2004) 253-264
    • (2004) Computers & Security , vol.23 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 8
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: towards socio-organizational perspectives
    • Dhillon G., and Backhouse J. Current directions in IS security research: towards socio-organizational perspectives. Information Systems Journal 11 (2001) 127-153
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 9
    • 0001797456 scopus 로고    scopus 로고
    • The interview: from structured questions to negotiated text
    • Denzin N.K., and Lincoln N.K. (Eds), Sage Publications, Inc., Thousand Oaks
    • Fontana A., and Frey J.H. The interview: from structured questions to negotiated text. In: Denzin N.K., and Lincoln N.K. (Eds). Handbook of qualitative research (2000), Sage Publications, Inc., Thousand Oaks 645-672
    • (2000) Handbook of qualitative research , pp. 645-672
    • Fontana, A.1    Frey, J.H.2
  • 10
    • 0042363355 scopus 로고    scopus 로고
    • The application of information security policies in large UK-based organizations: an exploratory investigation
    • Fulford H., and Doherty N.F. The application of information security policies in large UK-based organizations: an exploratory investigation. Information Management & Computer Security 11 3 (2003) 106-114
    • (2003) Information Management & Computer Security , vol.11 , Issue.3 , pp. 106-114
    • Fulford, H.1    Doherty, N.F.2
  • 11
    • 34547950128 scopus 로고    scopus 로고
    • Making security usable: are things improving?
    • Furnell S. Making security usable: are things improving?. Computers & Security 26 6 (2007) 434-443
    • (2007) Computers & Security , vol.26 , Issue.6 , pp. 434-443
    • Furnell, S.1
  • 13
    • 57849132173 scopus 로고    scopus 로고
    • Why Johnny can't surf (safely)? Attacks and defenses for web users
    • Herzberg A. Why Johnny can't surf (safely)? Attacks and defenses for web users. Computers & Security 28 1-2 (2009) 63-71
    • (2009) Computers & Security , vol.28 , Issue.1-2 , pp. 63-71
    • Herzberg, A.1
  • 15
    • 33750529997 scopus 로고    scopus 로고
    • Using a "common language" for computer security incident information
    • Bosworth S., and Kabay M.E. (Eds), John Wiley & Sons, New York
    • Howard J.D., and Meunier P. Using a "common language" for computer security incident information. In: Bosworth S., and Kabay M.E. (Eds). Computer security handbook (2002), John Wiley & Sons, New York 3.1-3.22
    • (2002) Computer security handbook
    • Howard, J.D.1    Meunier, P.2
  • 16
    • 18844431067 scopus 로고    scopus 로고
    • Information systems security policies: a contextual perspective
    • Karyda M., Kiountouzis E., and Kokolakis S. Information systems security policies: a contextual perspective. Computers & Security 24 (2005) 246-260
    • (2005) Computers & Security , vol.24 , pp. 246-260
    • Karyda, M.1    Kiountouzis, E.2    Kokolakis, S.3
  • 18
    • 33750510560 scopus 로고    scopus 로고
    • Kraemer S, Carayon P. Computer and information security culture: findings from two studies. In: Human Factors and Ergonomics Society, editor. Proceedings of the human factors and ergonomics society. Orlando, Florida; 2005. p. 1483-87.
    • Kraemer S, Carayon P. Computer and information security culture: findings from two studies. In: Human Factors and Ergonomics Society, editor. Proceedings of the human factors and ergonomics society. Orlando, Florida; 2005. p. 1483-87.
  • 19
    • 33750513188 scopus 로고    scopus 로고
    • Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists
    • Kraemer S., and Carayon P. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists. Applied Ergonomics 38 2 (2007) 143-154
    • (2007) Applied Ergonomics , vol.38 , Issue.2 , pp. 143-154
    • Kraemer, S.1    Carayon, P.2
  • 21
    • 63049132678 scopus 로고    scopus 로고
    • How significant is human error as a cause of privacy breaches? An empirical stud and framework for error management
    • Liginlal D., Sim I., and Khansa L. How significant is human error as a cause of privacy breaches? An empirical stud and framework for error management. Computers & Security 28 (2009) 215-228
    • (2009) Computers & Security , vol.28 , pp. 215-228
    • Liginlal, D.1    Sim, I.2    Khansa, L.3
  • 23
    • 84977349714 scopus 로고
    • Case and situational analysis
    • Mitchell J.C. Case and situational analysis. Sociological Review 31 2 (1983) 87-211
    • (1983) Sociological Review , vol.31 , Issue.2 , pp. 87-211
    • Mitchell, J.C.1
  • 25
    • 0003594156 scopus 로고
    • Morgan D.L. (Ed), Sage Publications, Inc., Newbury Park
    • In: Morgan D.L. (Ed). Focus groups as qualitative research, vol. 16 (1988), Sage Publications, Inc., Newbury Park
    • (1988) Focus groups as qualitative research, vol. 16
  • 29
    • 0011243622 scopus 로고
    • Risk management, adaption, and design for safety
    • Brehmer B., and Sahlin N.-E. (Eds), Kluwer Academic Publishers, Dordrecht
    • Rasmussen J. Risk management, adaption, and design for safety. In: Brehmer B., and Sahlin N.-E. (Eds). Future risks and risk management (1994), Kluwer Academic Publishers, Dordrecht 1-36
    • (1994) Future risks and risk management , pp. 1-36
    • Rasmussen, J.1
  • 32
    • 85008145482 scopus 로고    scopus 로고
    • Macroergonomic methods: assessing work system processes
    • Hendrick H.W., and Kleiner B. (Eds), Lawrence Erlbaum Associates, Mahweh, New Jersey
    • Robertson M.M., Kleiner B., and O'Neill M.J. Macroergonomic methods: assessing work system processes. In: Hendrick H.W., and Kleiner B. (Eds). Marcroergonomics: theory, methods, and applications (2002), Lawrence Erlbaum Associates, Mahweh, New Jersey 67-96
    • (2002) Marcroergonomics: theory, methods, and applications , pp. 67-96
    • Robertson, M.M.1    Kleiner, B.2    O'Neill, M.J.3
  • 33
    • 33846849570 scopus 로고    scopus 로고
    • Organisational security culture: extending the end-user perspective
    • Ruighaver A.B., Maynard S.B., and Chang S. Organisational security culture: extending the end-user perspective. Computers & Security 26 1 (2007) 56-62
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 56-62
    • Ruighaver, A.B.1    Maynard, S.B.2    Chang, S.3
  • 34
    • 0002815632 scopus 로고    scopus 로고
    • Data management and analysis methods
    • Denzin N.K., and Lincoln Y.S. (Eds), Sage Publications, Inc., Thousand Oaks
    • Ryan G.W., and Bernard H.R. Data management and analysis methods. In: Denzin N.K., and Lincoln Y.S. (Eds). Handbook of qualitative research (2000), Sage Publications, Inc., Thousand Oaks 769-801
    • (2000) Handbook of qualitative research , pp. 769-801
    • Ryan, G.W.1    Bernard, H.R.2
  • 38
    • 24644438691 scopus 로고    scopus 로고
    • The human factor in security
    • Schultz E. The human factor in security. Computers & Security 24 6 (2005) 425-426
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 425-426
    • Schultz, E.1
  • 40
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen M.T. A conceptual foundation for organizational information security awareness. Information Management & Computer Security 8 1 (2000) 31-41
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 44
    • 67650883222 scopus 로고    scopus 로고
    • An integrated view of human, organizational, and technological challenges of IT security management
    • Werlinger R., Hawkey K., and Beznosov K. An integrated view of human, organizational, and technological challenges of IT security management. Information Management & Computer Security 17 1 (2009) 4-49
    • (2009) Information Management & Computer Security , vol.17 , Issue.1 , pp. 4-49
    • Werlinger, R.1    Hawkey, K.2    Beznosov, K.3
  • 45
    • 2342492219 scopus 로고    scopus 로고
    • Carnegie Mellon University, School of Computer Science, Computer Science Department, Pittsburgh, PA
    • Whitten A., and Tygar J.D. Usability of security: a case study (1998), Carnegie Mellon University, School of Computer Science, Computer Science Department, Pittsburgh, PA
    • (1998) Usability of security: a case study
    • Whitten, A.1    Tygar, J.D.2
  • 47
    • 84962284852 scopus 로고    scopus 로고
    • Wood BJ. Duggan R. Red teaming of advanced information assurance concepts. In: DISCEX2000 DARPA information survivability conference. Hilton Head, South Carolina; 1999. p. SAND99-2590C.
    • Wood BJ. Duggan R. Red teaming of advanced information assurance concepts. In: DISCEX2000 DARPA information survivability conference. Hilton Head, South Carolina; 1999. p. SAND99-2590C.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.