메뉴 건너뛰기




Volumn , Issue , 2009, Pages 46-55

An information security ontology incorporating human-behavioural implications

Author keywords

Human behavioural implications; Information security ontology; Password policy

Indexed keywords

HUMAN BEHAVIOURAL IMPLICATIONS; INFORMATION SECURITY; INFORMATION SECURITY CONTROLS; INFORMATION SECURITY MANAGEMENTS; INFORMATION SECURITY ONTOLOGY; PASSWORD POLICY; SECURITY MANAGEMENT; SECURITY MANAGER;

EID: 70350630540     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1626195.1626209     Document Type: Conference Paper
Times cited : (42)

References (42)
  • 1
    • 33645967666 scopus 로고    scopus 로고
    • BS ISO/IEC 27001:2005 - Information Technology - Security Techniques - Information Security Management Systems - Requirements
    • British Standards Institution
    • British Standards Institution, "BS ISO/IEC 27001:2005 - Information Technology - Security Techniques - Information Security Management Systems - Requirements", 2005
    • (2005)
  • 2
    • 28044457328 scopus 로고    scopus 로고
    • BS ISO/IEC 27002:2005 - Information Technology - Security Techniques - Code of Practice for Information Security Management
    • British Standards Institution
    • British Standards Institution, "BS ISO/IEC 27002:2005 - Information Technology - Security Techniques - Code of Practice for Information Security Management", 2005
    • (2005)
  • 4
    • 70350691801 scopus 로고    scopus 로고
    • Human Vulnerabilities in Security Systems: White Paper
    • KTN Human Factors Working Group, Cyber Security Knowledge Transfer Network KTN
    • KTN Human Factors Working Group, "Human Vulnerabilities in Security Systems: White Paper", Cyber Security Knowledge Transfer Network (KTN), 2007
    • (2007)
  • 7
    • 39849089088 scopus 로고    scopus 로고
    • A Psychometric Study of Information Technology Risks in the Workplace
    • Society for Risk Analysis
    • R. Coles, G. P. Hodgkinson, "A Psychometric Study of Information Technology Risks in the Workplace", Risk Analysis, 28(1), pp 81-93, Society for Risk Analysis, 2008
    • (2008) Risk Analysis , vol.28 , Issue.1 , pp. 81-93
    • Coles, R.1    Hodgkinson, G.P.2
  • 8
    • 70450164693 scopus 로고    scopus 로고
    • F. N. do Amaral, C. Bazilio, G. M. Hamazaki da Silva, A. Rademaker, E. H. Haeusler, An Ontology-Based Approach to the Formalization of Information Security Policies, Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops (EDOCW), pp 1, 2006
    • F. N. do Amaral, C. Bazilio, G. M. Hamazaki da Silva, A. Rademaker, E. H. Haeusler, "An Ontology-Based Approach to the Formalization of Information Security Policies", Proceedings of the 10th IEEE on International Enterprise Distributed Object Computing Conference Workshops (EDOCW), pp 1, 2006
  • 12
    • 70350660122 scopus 로고    scopus 로고
    • Newcastle University UK, last viewed 24/02/09
    • Newcastle University UK, "Trust Economics Website", http://www.trust-economics.org/, last viewed 24/02/09
    • Trust Economics Website
  • 15
    • 70350690212 scopus 로고    scopus 로고
    • The Economics of Information Security
    • Cyber Security Knowledge Transfer Network (KTN) & Economic & Social Research Council ESRC
    • Cyber Security Knowledge Transfer Network (KTN) & Economic & Social Research Council (ESRC), "The Economics of Information Security", ESRC Seminar Series, 2008
    • (2008) ESRC Seminar Series
  • 17
    • 70350693946 scopus 로고    scopus 로고
    • W3C, OWL Web Ontology Language Overview, http://www.w3.org/ TR/owl-features/, 2004, last viewed 24/02/09
    • W3C, "OWL Web Ontology Language Overview", http://www.w3.org/ TR/owl-features/, 2004, last viewed 24/02/09
  • 18
    • 33244454674 scopus 로고    scopus 로고
    • Stanford Center for Biomedical Informatics Research, last viewed 24/02/09
    • Stanford Center for Biomedical Informatics Research, "The Protégé Ontology Editor and Knowledge Acquisition System", http://protege.stanford.edu/, last viewed 24/02/09
    • The Protégé Ontology Editor and Knowledge Acquisition System
  • 19
    • 84900482702 scopus 로고    scopus 로고
    • Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem
    • P. Dourish, R. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem". Personal and Ubiquitous Computing, 8(6), pp 391-401, 2004
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.2    Delgado de la Flor, J.3    Joseph, M.4
  • 20
    • 70350665921 scopus 로고    scopus 로고
    • Information Security Awareness Forum (ISAF) & Information Assurance Advisory Council IAAC, last viewed 24/02/09
    • Information Security Awareness Forum (ISAF) & Information Assurance Advisory Council (IAAC), "Creating a Strong Information Handling Culture", http://www.iaac.org.uk/Portals/0/23176\-DIAN\-A5\-PEOPLE\-15\-4. pdf, last viewed 24/02/09
    • Creating a Strong Information Handling Culture
  • 23
    • 33748188062 scopus 로고    scopus 로고
    • A Quantitative Method for ISO 17799 Gap Analysis
    • B. Karabacak & I. Sogukpinar, "A Quantitative Method for ISO 17799 Gap Analysis", Computers & Security, 25(6), pp 413-419, 2006
    • (2006) Computers & Security , vol.25 , Issue.6 , pp. 413-419
    • Karabacak, B.1    Sogukpinar, I.2
  • 24
    • 29744447253 scopus 로고    scopus 로고
    • Business-Driven Application Security: From Modeling to Managing Secure Applications
    • N. Nagaratnam, A. J. Nadalin, M. Hondo, M. McIntosh, P. Austel, "Business-Driven Application Security: From Modeling to Managing Secure Applications", IBM Systems Journal, 44(4), pp 847-868, 2005
    • (2005) IBM Systems Journal , vol.44 , Issue.4 , pp. 847-868
    • Nagaratnam, N.1    Nadalin, A.J.2    Hondo, M.3    McIntosh, M.4    Austel, P.5
  • 26
    • 0036173202 scopus 로고    scopus 로고
    • Insider Threat Prediction Tool: Evaluating the probability of IT misuse
    • G. Magklaras & S. Furnell, "Insider Threat Prediction Tool: Evaluating the probability of IT misuse", Computers & Security, vol. 21, no. 1, pp 62-73, 2002
    • (2002) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.1    Furnell, S.2
  • 27
    • 0030409989 scopus 로고    scopus 로고
    • Towards a Framework to Verify Knowledge Sharing Technology
    • A. Gómez-Pérez, "Towards a Framework to Verify Knowledge Sharing Technology", Expert Systems with Applications, Vol. 11, No. 4, pp 519-529, 1996
    • (1996) Expert Systems with Applications , vol.11 , Issue.4 , pp. 519-529
    • Gómez-Pérez, A.1
  • 33
    • 50049109224 scopus 로고    scopus 로고
    • S. Fenz, G. Goluch, A. Ekelhart, B. Riedl, and E. Weippl, Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard, Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing (PRDC2007), IEEE Computer Society, pp 381-388, 2007
    • S. Fenz, G. Goluch, A. Ekelhart, B. Riedl, and E. Weippl, "Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard", Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing (PRDC2007), IEEE Computer Society, pp 381-388, 2007
  • 35
    • 84869138544 scopus 로고    scopus 로고
    • An Ontological Approach Applied to Information Security and Trust
    • A. Vorobiev & N. Bekmamedova, "An Ontological Approach Applied to Information Security and Trust", ACIS 2007 Proceedings, 2007
    • (2007) ACIS 2007 Proceedings
    • Vorobiev, A.1    Bekmamedova, N.2
  • 41
    • 70350651716 scopus 로고    scopus 로고
    • S. R. Band, D. M. Cappelli, L. F. Fischer, A. P. Moore, E. D. Shaw, R. F. Trzeciak, Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, CMU/SEI-2006-TR-026, Carnegie Mellon University, 2006
    • S. R. Band, D. M. Cappelli, L. F. Fischer, A. P. Moore, E. D. Shaw, R. F. Trzeciak, "Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis", CMU/SEI-2006-TR-026, Carnegie Mellon University, 2006
  • 42
    • 70350643359 scopus 로고    scopus 로고
    • University College London, last viewed 19/05/09
    • University College London, "Human Centred Systems Group", http://hornbeam.cs.ucl.ac.uk/hcs/index.html, last viewed 19/05/09
    • Human Centred Systems Group


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.