메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 476-481

Effects of individual and organization based beliefs and the moderating role of work experience on insiders' good security behaviors

Author keywords

Compliance; Experience; Individual identity; Information security awareness; Information security policy; Social dentity

Indexed keywords

COST OF COMPLIANCE; IDENTITY INFORMATION; INDIVIDUAL-BASED; INFORMATION SECURITY; INFORMATION SECURITY AWARENESS; INFORMATION SECURITY POLICIES; NON-COMPLIANCE; ORGANIZATIONAL MODELS; RESEARCH MODELS; STRUCTURAL MODELS; TECHNOLOGY RESOURCES; WORK EXPERIENCE;

EID: 70849104596     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.484     Document Type: Conference Paper
Times cited : (19)

References (20)
  • 1
    • 44649169106 scopus 로고    scopus 로고
    • Deloitte, Deloitte Touche Tohmatsu
    • Deloitte, "Global security survey, " Deloitte Touche Tohmatsu, 2005.
    • (2005) Global Security Survey
  • 3
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • D. W. Straub, "Effective IS Security: An Empirical Study, " Information Systems Research, vol. 1, pp. 255-276, 1990.
    • (1990) Information Systems Research , vol.1 , pp. 255-276
    • Straub, D.W.1
  • 4
    • 77951724076 scopus 로고    scopus 로고
    • Information security control resources in organizations: A multidimensional view and their key drivers
    • H. Cavusoglu, H. Cavusoglu, J. Son, and I. Benbasat, "Information Security Control Resources in Organizations: A Multidimensional View and Their Key Drivers, " UBC Working Paper, 2008.
    • (2008) UBC Working Paper
    • Cavusoglu, H.1    Cavusoglu, H.2    Son, J.3    Benbasat, I.4
  • 5
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in information security research: Toward socio-organizational perspectives
    • G. Dhillon, and J. Backhouse, "Current Directions in Information Security Research: Toward Socio-Organizational Perspectives, " Information Systems Journal, vol. 11, pp. 127-153, 2001.
    • (2001) Information Systems Journal , vol.11 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 6
    • 30744438863 scopus 로고    scopus 로고
    • An analysis of the traditional IS security approaches: Implications for research and practice
    • M. Siponen, "An analysis of the traditional IS security approaches: implications for research and practice, " European Journal of Information Systems, vol. 14, pp. 303-315, 2005.
    • (2005) European Journal of Information Systems , vol.14 , pp. 303-315
    • Siponen, M.1
  • 7
  • 9
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • J. Lee, and Y. Lee, "A holistic model of computer abuse within organizations, " Information management & computer security, vol. 10, pp. 57-63, 2002.
    • (2002) Information Management & Computer Security , vol.10 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 10
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • S. M. Lee, S. G. Lee, and S. Yoo, "An integrative model of computer abuse based on social control and general deterrence theories, " Information & Management, vol. 41, pp. 707-718, 2003.
    • (2003) Information & Management , vol.41 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 11
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A field study
    • D. W. Straub, and W. D. Nance, "Discovering and disciplining computer abuse in organizations: a field study, " MIS Quarterly, vol. 14, pp. 45-60, 1990.
    • (1990) MIS Quarterly , vol.14 , pp. 45-60
    • Straub, D.W.1    Nance, W.D.2
  • 12
    • 33750683067 scopus 로고    scopus 로고
    • Understanding the perpetration of employee computer crime in the organisational context
    • R. Willison, "Understanding the Perpetration of Employee Computer Crime in the Organisational Context, " Information and organization, vo. 16, pp. 304-324, 2006.
    • (2006) Information and Organization , vol.16 , pp. 304-324
    • Willison, R.1
  • 15
    • 0003010471 scopus 로고
    • Social identity theory and the organization
    • B. E. Ashforth, and F. Mael, "Social identity theory and the organization, " Academy of Management Review, vol. 14, pp. 20-39, 1989.
    • (1989) Academy of Management Review , vol.14 , pp. 20-39
    • Ashforth, B.E.1    Mael, F.2
  • 16
    • 84965539758 scopus 로고
    • Social identity and intergroup behavior
    • H. Tajfel, "Social identity and intergroup behavior, " Social Science Information, vol. 13, pp. 65-93, 1974.
    • (1974) Social Science Information , vol.13 , pp. 65-93
    • Tajfel, H.1
  • 17
    • 0038382615 scopus 로고
    • An integrative theory of intergroup conflict
    • W. G. Austin, and S. Worchel ed. Monterey, CA, 94-109
    • H. Tajfel, J. Turner, "An Integrative Theory of Intergroup Conflict, " in The Social Psychology of Intergroup Relations, W. G. Austin, and S. Worchel ed. Monterey, CA, 94-109, 1979.
    • (1979) The Social Psychology of Intergroup Relations
    • Tajfel, H.1    Turner, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.