메뉴 건너뛰기




Volumn 29, Issue 2, 2010, Pages 196-207

A framework and assessment instrument for information security culture

Author keywords

Assessment instrument; Framework; Human; Information security culture; Measure; Organisational behaviour; Organisational culture

Indexed keywords

ASSESSMENT INSTRUMENTS; EMPIRICAL STUDIES; INFORMATION ASSETS; INFORMATION SECURITY; MISBEHAVIOUR; ORGANISATIONAL BEHAVIOUR; ORGANISATIONAL CULTURE; SECURITY-AWARE;

EID: 74449092722     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.09.002     Document Type: Article
Times cited : (296)

References (64)
  • 1
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' views on information security
    • Albrechtsen E. A qualitative study of users' views on information security. Computers and Security 26 (2007) 276-289
    • (2007) Computers and Security , Issue.26 , pp. 276-289
    • Albrechtsen, E.1
  • 2
    • 74449093050 scopus 로고    scopus 로고
    • Fighting the enemy within
    • April
    • Andric M. Fighting the enemy within. IT WEB Special Report, vol. 95; April 2007. p. 54.
    • (2007) IT WEB Special Report , vol.95 , pp. 54
    • Andric, M.1
  • 3
    • 34249864109 scopus 로고    scopus 로고
    • Creating a culture of security
    • Baggett W.O. Creating a culture of security. The Internal Auditor 3 60 (2003) 37-41
    • (2003) The Internal Auditor , vol.3 , Issue.60 , pp. 37-41
    • Baggett, W.O.1
  • 5
    • 74449090955 scopus 로고    scopus 로고
    • Enterprise strategies: advice for a secure enterprise: implement the basics and see that everyone uses them
    • November
    • Borck J.R. Enterprise strategies: advice for a secure enterprise: implement the basics and see that everyone uses them. InfoWorld 22 46 (2000) November
    • (2000) InfoWorld , vol.22 , Issue.46
    • Borck, J.R.1
  • 7
    • 0347405262 scopus 로고
    • Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime
    • Cardinali R. Reinforcing our moral vision: examining the relationship between unethical behaviour and computer crime. Work Study 44 8 (1995) 11-18
    • (1995) Work Study , vol.44 , Issue.8 , pp. 11-18
    • Cardinali, R.1
  • 10
    • 33745869216 scopus 로고    scopus 로고
    • Security starts from within
    • Connolly P.J. Security starts from within. InfoWorld 22 28 (2000) 39-40
    • (2000) InfoWorld , vol.22 , Issue.28 , pp. 39-40
    • Connolly, P.J.1
  • 12
    • 74449084015 scopus 로고    scopus 로고
    • Information security culture - validation of an assessment instrument
    • Da Veiga A., Martins N., and Eloff J.H.P. Information security culture - validation of an assessment instrument. Southern African Business Review 11 1 (2007) 146-166
    • (2007) Southern African Business Review , vol.11 , Issue.1 , pp. 146-166
    • Da Veiga, A.1    Martins, N.2    Eloff, J.H.P.3
  • 13
    • 0034335593 scopus 로고    scopus 로고
    • Framework for linking culture and improvement initiatives in organisations
    • Detert J.R., Schroeder J., and Mauriel A. Framework for linking culture and improvement initiatives in organisations. The Academy of Management Review 25 4 (2000) 850-863
    • (2000) The Academy of Management Review , vol.25 , Issue.4 , pp. 850-863
    • Detert, J.R.1    Schroeder, J.2    Mauriel, A.3
  • 16
    • 33749469542 scopus 로고    scopus 로고
    • Malicious or misinformed? Exploring a contributor to the insider threat
    • Furnell S. Malicious or misinformed? Exploring a contributor to the insider threat. Computer Fraud and Security 9 (2006) 8-12
    • (2006) Computer Fraud and Security , Issue.9 , pp. 8-12
    • Furnell, S.1
  • 17
    • 28644433426 scopus 로고    scopus 로고
    • Integrated Information Security Architecture
    • Eloff J.H.P., and Eloff M. Integrated Information Security Architecture. Computer Fraud and Security 11 (2005) 10-16
    • (2005) Computer Fraud and Security , Issue.11 , pp. 10-16
    • Eloff, J.H.P.1    Eloff, M.2
  • 18
    • 33846869993 scopus 로고    scopus 로고
    • IFIP workshop - information security culture
    • Furnell S. IFIP workshop - information security culture. Computers and Security 26 (2007) 35
    • (2007) Computers and Security , Issue.26 , pp. 35
    • Furnell, S.1
  • 20
    • 74449093030 scopus 로고    scopus 로고
    • Retrieved online on 16 January 2006 from
    • Grant R. Building a strong security culture. Retrieved online on 16 January 2006 from (2005). http://www.citec.com.au/news/featureNews/2005/April/security_culture.sht ml?rate
    • (2005) Building a strong security culture
    • Grant, R.1
  • 23
    • 74449084986 scopus 로고    scopus 로고
    • Information Security Forum. Information Security Culture - A preliminary investigation. s.l. 2000.
    • Information Security Forum. Information Security Culture - A preliminary investigation. s.l. 2000.
  • 24
    • 28044457328 scopus 로고    scopus 로고
    • Information technology. Security techniques. Code of practice for information security management; 2005
    • ISO/IEC 27002
    • ISO/IEC 27002:2005. Information technology. Security techniques. Code of practice for information security management; 2005.
    • (2005)
  • 26
    • 33750513188 scopus 로고    scopus 로고
    • Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    • Kraemer S., and Carayon P. Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Applied Ergonomics 38 (2007) 143-154
    • (2007) Applied Ergonomics , vol.38 , pp. 143-154
    • Kraemer, S.1    Carayon, P.2
  • 30
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • Kruger H.A., and Kearney W.D. A prototype for assessing information security awareness. Computers and Security 25 (2006) 289-296
    • (2006) Computers and Security , vol.25 , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 33
    • 74449086668 scopus 로고    scopus 로고
    • A preliminary model of end user sophistication for insider threat prediction in IT systems
    • Magklaras G.B., and Furnell S.M. A preliminary model of end user sophistication for insider threat prediction in IT systems. Computers and Security 25 (2006) 27-35
    • (2006) Computers and Security , vol.25 , pp. 27-35
    • Magklaras, G.B.1    Furnell, S.M.2
  • 34
    • 84870529816 scopus 로고    scopus 로고
    • Information security culture
    • IFIP/SEC2002, Kluwer Academic, Boston
    • Martins A., and Eloff J.H.P. Information security culture. IFIP/SEC2002. Security in the information society (2002), Kluwer Academic, Boston 203-214
    • (2002) Security in the information society , pp. 203-214
    • Martins, A.1    Eloff, J.H.P.2
  • 35
    • 74449092147 scopus 로고    scopus 로고
    • Martins EC. Die invloed van organisasiekultuur op kreatiwiteit en innovasie in 'n universiteitbiblioteek. Pretoria: Universiteit van Suid Afrika; 2000 (M.Com thesis).
    • Martins EC. Die invloed van organisasiekultuur op kreatiwiteit en innovasie in 'n universiteitbiblioteek. Pretoria: Universiteit van Suid Afrika; 2000 (M.Com thesis).
  • 36
    • 84870529816 scopus 로고    scopus 로고
    • Master's dissertation. Johannesburg: Rand Afrikaans University;
    • Martins A. Information security culture. Master's dissertation. Johannesburg: Rand Afrikaans University; 2002.
    • (2002) Information security culture
    • Martins, A.1
  • 44
    • 33846849570 scopus 로고    scopus 로고
    • Organisational security culture: extending the end-user perspective
    • Ruighaver A.B., Maynard S.B., and Chang S. Organisational security culture: extending the end-user perspective. Computers and Security 2007 26 (2006) 56-62
    • (2006) Computers and Security , vol.2007 , Issue.26 , pp. 56-62
    • Ruighaver, A.B.1    Maynard, S.B.2    Chang, S.3
  • 46
    • 2542553531 scopus 로고    scopus 로고
    • Evaluating the fit of structural equation models: test of significance and descriptive goodness-of-fit measures
    • Schermelleh-Engel K., Moosbrugger H., and Muller H. Evaluating the fit of structural equation models: test of significance and descriptive goodness-of-fit measures. Methods of Psychological Research Online 8 2 (2003) 23-74
    • (2003) Methods of Psychological Research Online , vol.8 , Issue.2 , pp. 23-74
    • Schermelleh-Engel, K.1    Moosbrugger, H.2    Muller, H.3
  • 51
    • 0000280419 scopus 로고
    • Effective IS security: an empirical study
    • Straub D.W. Effective IS security: an empirical study. Information Systems Research 1 3 (1990) 255-276
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 53
    • 74449087878 scopus 로고    scopus 로고
    • Retrieved online on 23 January 2008 from
    • Survey tracker. Retrieved online on 23 January 2008 from (2008). http://www.surveytracker.com
    • (2008) Survey tracker
  • 55
    • 74449091408 scopus 로고    scopus 로고
    • Cyber-baddies make jay as CIOs snooze
    • Van der Merwe P., and Cantale S. Cyber-baddies make jay as CIOs snooze. Brainstorm 6 9 (2007) 59-66
    • (2007) Brainstorm , vol.6 , Issue.9 , pp. 59-66
    • Van der Merwe, P.1    Cantale, S.2
  • 56
    • 74449088680 scopus 로고    scopus 로고
    • Information Security South Africa - Proceedings of ISSA 2005, 4th Annual Information Security South Africa Conference. South Africa. Retrieved online on 16 March 2008 from
    • Van Niekerk J., and Von Solms R. A holistic framework for the fostering of an information security sub-culture in organizations. Information Security South Africa - Proceedings of ISSA 2005, 4th Annual Information Security South Africa Conference. South Africa. Retrieved online on 16 March 2008 from (2005). http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/041_Article.pdf
    • (2005) A holistic framework for the fostering of an information security sub-culture in organizations
    • Van Niekerk, J.1    Von Solms, R.2
  • 57
    • 84869141956 scopus 로고    scopus 로고
    • Retrieved online on 9 July 2009 from
    • Verizon. Data breach investigations report. Retrieved online on 9 July 2009 from (2009). http://www.verizonbusiness.com/resources/security/reports/2009databreach rp.pdf
    • (2009) Data breach investigations report
    • Verizon1
  • 58
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • Vroom C., and Von Solms R. Towards information security behavioural compliance. Computers and Security 23 3 (2004) 191-198
    • (2004) Computers and Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.