메뉴 건너뛰기




Volumn 17, Issue 4, 2009, Pages 296-310

A canonical analysis of intentional information security breaches by insiders

Author keywords

Behaviour; Data security; Motivation (psychology)

Indexed keywords

CANONICAL ANALYSIS; DATA SECURITY; DESIGN/METHODOLOGY/APPROACH; INFORMATION SECURITY; MOTIVATION (PSYCHOLOGY); SECURITY BREACHES; SUBSTANCE ABUSE; WARNING SIGNS;

EID: 76649136483     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220910993962     Document Type: Article
Times cited : (25)

References (53)
  • 1
    • 76649107801 scopus 로고    scopus 로고
    • The insider threat
    • Aldhizer, G. (2007), “The insider threat”, Internal Auditor, Vol. 65 No. 2, pp. 71-3.
    • (2007) Internal Auditor , vol.65 , Issue.2 , pp. 71-73
    • Aldhizer, G.1
  • 5
    • 35949002871 scopus 로고    scopus 로고
    • Main and moderating effects of self-control, organizational justice, and emotional labor on counterproductive behavior at work
    • Bechtoldt, M., Welk, C., Hartig, J. and Zapf, D. (2007), “Main and moderating effects of self-control, organizational justice, and emotional labor on counterproductive behavior at work”, European Journal of Work and Organizational Psychology, Vol. 16 No. 4, pp. 479-500.
    • (2007) European Journal of Work and Organizational Psychology , vol.16 , Issue.4 , pp. 479-500
    • Bechtoldt, M.1    Welk, C.2    Hartig, J.3    Zapf, D.4
  • 6
    • 24144458931 scopus 로고    scopus 로고
    • Information systems security from a knowledge management perspective
    • Belsis, P., Kokolakis, S. and Kiountouzis, E. (2005), “Information systems security from a knowledge management perspective”, Information Management & Computer Security, Vol. 13 No. 3, pp. 189-202.
    • (2005) Information Management & Computer Security , vol.13 , Issue.3 , pp. 189-202
    • Belsis, P.1    Kokolakis, S.2    Kiountouzis, E.3
  • 7
    • 0035579386 scopus 로고    scopus 로고
    • Predictors of employee deviance: the relationship between bad attitudes and bad behaviors
    • Bolin, A. and Heatherly, L. (2001), “Predictors of employee deviance: the relationship between bad attitudes and bad behaviors”, Journal of Business and Psychology, Vol. 15 No. 3, pp. 405-18.
    • (2001) Journal of Business and Psychology , vol.15 , Issue.3 , pp. 405-418
    • Bolin, A.1    Heatherly, L.2
  • 10
    • 30844454018 scopus 로고    scopus 로고
    • Uncovering the relationship between workplace destructive and constructive behaviors: an exploratory study
    • Galperin, B. and Burke, R. (2006), “Uncovering the relationship between workplace destructive and constructive behaviors: an exploratory study”, International Journal of Human Resource Management, Vol. 17 No. 2, pp. 331-47.
    • (2006) International Journal of Human Resource Management , vol.17 , Issue.2 , pp. 331-347
    • Galperin, B.1    Burke, R.2
  • 11
    • 0037203599 scopus 로고    scopus 로고
    • HP's Superdome sabotaged by ex-employee
    • Gengler, B. (2002), “HP's Superdome sabotaged by ex-employee”, Computer Fraud & Security, Vol. 2 No. 1, pp. 5-6.
    • (2002) Computer Fraud & Security , vol.2 , Issue.1 , pp. 5-6
    • Gengler, B.1
  • 12
    • 76649143965 scopus 로고    scopus 로고
    • Three year jail sentence for Carillion worker
    • Gerrard, N. (2008), “Three year jail sentence for Carillion worker”, Contract Journal, Vol. 44 No. 3, p. 39.
    • (2008) Contract Journal , vol.44 , Issue.3 , pp. 39
    • Gerrard, N.1
  • 13
    • 0001021040 scopus 로고
    • Reasons for employee sabotage in the workplace
    • Giacalone, R. (1987), “Reasons for employee sabotage in the workplace”, Journal of Business and Psychology, Vol. 1 No. 4, pp. 367-78.
    • (1987) Journal of Business and Psychology , vol.1 , Issue.4 , pp. 367-378
    • Giacalone, R.1
  • 14
    • 33644600194 scopus 로고    scopus 로고
    • Maturity model for IT outsourcing relationships
    • Gottschalk, P. and Solli, H. (2006), “Maturity model for IT outsourcing relationships”, Industrial Management & Data Systems, Vol. 106 No. 2, pp. 200-12.
    • (2006) Industrial Management & Data Systems , vol.106 , Issue.2 , pp. 200-212
    • Gottschalk, P.1    Solli, H.2
  • 15
    • 76649086251 scopus 로고    scopus 로고
    • Lost or stolen data: minimizing fallout
    • Granade, P. (2008), “Lost or stolen data: minimizing fallout”, Inside Counsel, Vol. 18 No. 2, p. 7.
    • (2008) Inside Counsel , vol.18 , Issue.2 , pp. 7
    • Granade, P.1
  • 19
    • 34548444057 scopus 로고    scopus 로고
    • Building an endpoint security arsenal
    • Isreal, R. (2007), “Building an endpoint security arsenal”, Health Management Technology, Vol. 28 No. 7, pp. 12-36.
    • (2007) Health Management Technology , vol.28 , Issue.7 , pp. 12-36
    • Isreal, R.1
  • 20
    • 76649112965 scopus 로고    scopus 로고
    • HMRC left the door open to data theft
    • Kamath, J. and Flinders, K. (2008), “HMRC left the door open to data theft”, Computer Weekly, Vol. 14 No. 28, pp. 6-7.
    • (2008) Computer Weekly , vol.14 , Issue.28 , pp. 6-7
    • Kamath, J.1    Flinders, K.2
  • 21
    • 0009083545 scopus 로고
    • Perceived organizational climate and employee counterproductively
    • Kamp, J. and Brooks, P. (1991), “Perceived organizational climate and employee counterproductively”, Business and Psychology, Vol. 5 No. 4, pp. 447-58.
    • (1991) Business and Psychology , vol.5 , Issue.4 , pp. 447-458
    • Kamp, J.1    Brooks, P.2
  • 22
    • 2642567457 scopus 로고    scopus 로고
    • Will you survive the services revolution
    • Karmarkar, U. (2004), “Will you survive the services revolution”, Harvard Business Review, Vol. 82 No. 6, pp. 100-7.
    • (2004) Harvard Business Review , vol.82 , Issue.6 , pp. 100-107
    • Karmarkar, U.1
  • 24
    • 34548202158 scopus 로고    scopus 로고
    • Employee satisfaction and theft: testing climate perceptions as a mediator
    • Kulas, J., McInnerney, J., DeMuth, J. and Jadwinski, V. (2007), “Employee satisfaction and theft: testing climate perceptions as a mediator”, Journal of Psychology, Vol. 14 No. 1, pp. 389-402.
    • (2007) Journal of Psychology , vol.14 , Issue.1 , pp. 389-402
    • Kulas, J.1    McInnerney, J.2    DeMuth, J.3    Jadwinski, V.4
  • 25
    • 54949103238 scopus 로고    scopus 로고
    • Managed IT services: the role of IT standards
    • Kumbakara, N. (2008), “Managed IT services: the role of IT standards”, Information Management & Computer Security, Vol. 16 No. 4, pp. 336-59.
    • (2008) Information Management & Computer Security , vol.16 , Issue.4 , pp. 336-359
    • Kumbakara, N.1
  • 26
    • 76649095175 scopus 로고    scopus 로고
    • Endpoint security holes open a door for hackers
    • McAlearney, S. (2008), “Endpoint security holes open a door for hackers”, CIO Magazine, Vol. 21 No. 20, p. 13.
    • (2008) CIO Magazine , vol.21 , Issue.20 , pp. 13
    • McAlearney, S.1
  • 27
    • 76649110104 scopus 로고    scopus 로고
    • Case of insider sabotage at Omega Engineering
    • McCrea, A. (2008), “Case of insider sabotage at Omega Engineering”, Business Case Journal, Vol. 15 No. 1, pp. 61-73.
    • (2008) Business Case Journal , vol.15 , Issue.1 , pp. 61-73
    • McCrea, A.1
  • 28
    • 0016471408 scopus 로고
    • Job satisfaction, counterproductive behavior, and drug use at work
    • Mangione, T. and Quinn, R. (1974), “Job satisfaction, counterproductive behavior, and drug use at work”, Journal of Applied Psychology, Vol. 60 No. 1, pp. 114-6.
    • (1974) Journal of Applied Psychology , vol.60 , Issue.1 , pp. 114-116
    • Mangione, T.1    Quinn, R.2
  • 29
    • 76649141931 scopus 로고    scopus 로고
    • Energy firms face upgrades
    • Messmer, E. (2007), “Energy firms face upgrades”, Network World, Vol. 24 No. 49, p. 12.
    • (2007) Network World , vol.24 , Issue.49 , pp. 12
    • Messmer, E.1
  • 30
    • 76649143284 scopus 로고    scopus 로고
    • The problem with paperless
    • Mirsky, S. (2008), “The problem with paperless”, Information Outlook, Vol. 12 No. 8, pp. 33-5.
    • (2008) Information Outlook , vol.12 , Issue.8 , pp. 33-35
    • Mirsky, S.1
  • 31
    • 76649101640 scopus 로고    scopus 로고
    • 1st step in defending against thieves: don't hire them
    • Morrow, B. (2008), “1st step in defending against thieves: don't hire them”, Credit Union Journal, Vol. 12 No. 38, p. 8.
    • (2008) Credit Union Journal , vol.12 , Issue.38 , pp. 8
    • Morrow, B.1
  • 32
    • 76649123304 scopus 로고    scopus 로고
    • 5 steps for stopping the insider threat
    • Neray, P. (2008), “5 steps for stopping the insider threat”, Wall Street and Technology, Vol. 26 No. 9, p. 32.
    • (2008) Wall Street and Technology , vol.26 , Issue.9 , pp. 32
    • Neray, P.1
  • 33
    • 0032332318 scopus 로고    scopus 로고
    • Workplace violence and workplace aggression: evidence concerning specific forms, potential causes, and preferred targets
    • Neuman, J. and Baron, R. (1998), “Workplace violence and workplace aggression: evidence concerning specific forms, potential causes, and preferred targets”, Journal of Management, Vol. 24 No. 3, pp. 391-419.
    • (1998) Journal of Management , vol.24 , Issue.3 , pp. 391-419
    • Neuman, J.1    Baron, R.2
  • 34
    • 39149109926 scopus 로고    scopus 로고
    • The relative correlates of organizational citizenship behavior and counterproductive work behavior using multiple scores of data
    • O'Brian, K. and Allen, T. (2008), “The relative correlates of organizational citizenship behavior and counterproductive work behavior using multiple scores of data”, Business and Psychology, Vol. 21 No. 1, pp. 62-88.
    • (2008) Business and Psychology , vol.21 , Issue.1 , pp. 62-88
    • O'Brian, K.1    Allen, T.2
  • 35
    • 76649085113 scopus 로고    scopus 로고
    • Means to an endpoint
    • Ohlhorst, F. (2007), “Means to an endpoint”, eWeek, Vol. 24 No. 39, pp. 1-4.
    • (2007) eWeek , vol.24 , Issue.39 , pp. 1-4
    • Ohlhorst, F.1
  • 37
    • 76649104558 scopus 로고    scopus 로고
    • Security tightens for SMBs
    • Prince, B. (2008), “Security tightens for SMBs”, eWeek, Vol. 25 No. 14, p. 21.
    • (2008) eWeek , vol.25 , Issue.14 , pp. 21
    • Prince, B.1
  • 38
    • 49249127269 scopus 로고    scopus 로고
    • Information security management objectives and practices: a parsimonious framework
    • Qingxiong, M., Johnston, A. and Pearson, M. (2008), “Information security management objectives and practices: a parsimonious framework”, Information Management & Computer Security, Vol. 16 No. 3, pp. 251-70.
    • (2008) Information Management & Computer Security , vol.16 , Issue.3 , pp. 251-270
    • Qingxiong, M.1    Johnston, A.2    Pearson, M.3
  • 40
    • 44149112352 scopus 로고    scopus 로고
    • Treating employees as a threat
    • Roemer, K. (2008), “Treating employees as a threat”, Network Security, Vol. 11 No. 5, pp. 9-11.
    • (2008) Network Security , vol.11 , Issue.5 , pp. 9-11
    • Roemer, K.1
  • 41
    • 76649111267 scopus 로고    scopus 로고
    • Security that's all business
    • Sarrel, M. (2008), “Security that's all business”, PC Magazine, Vol. 27 No. 4, p. 62.
    • (2008) PC Magazine , vol.27 , Issue.4 , pp. 62
    • Sarrel, M.1
  • 42
    • 40549137449 scopus 로고    scopus 로고
    • When explanation for layoffs are not enough: employer's integrity as a moderator of the relationship between informational justice and retaliation
    • Skarlicki, D., Barclay, L. and Pugh, D. (2008), “When explanation for layoffs are not enough: employer's integrity as a moderator of the relationship between informational justice and retaliation”, Journal of Occupational & Organizational Psychology, Vol. 81 No. 1, pp. 123-46.
    • (2008) Journal of Occupational & Organizational Psychology , vol.81 , Issue.1 , pp. 123-146
    • Skarlicki, D.1    Barclay, L.2    Pugh, D.3
  • 43
    • 0001526612 scopus 로고
    • Relationships of organizational frustration with reported behavioral reactions employees
    • Spector, P. (1975), “Relationships of organizational frustration with reported behavioral reactions employees”, Journal of Applied Psychology, Vol. 60 No. 5, pp. 635-7.
    • (1975) Journal of Applied Psychology , vol.60 , Issue.5 , pp. 635-637
    • Spector, P.1
  • 44
    • 34247091938 scopus 로고    scopus 로고
    • A strategic modeling technique for information risk assessment
    • Subhas, M., Kumar, V. and Kumar, U. (2007), “A strategic modeling technique for information risk assessment”, Information Management & Computer Security, Vol. 15 No. 1, pp. 64-77.
    • (2007) Information Management & Computer Security , vol.15 , Issue.1 , pp. 64-77
    • Subhas, M.1    Kumar, V.2    Kumar, U.3
  • 45
    • 38349098488 scopus 로고    scopus 로고
    • The conflict-positive organization
    • Tjosvold, D. (2008), “The conflict-positive organization”, Journal of Organizational Behavior, Vol. 29 No. 1, pp. 19-28.
    • (2008) Journal of Organizational Behavior , vol.29 , Issue.1 , pp. 19-28
    • Tjosvold, D.1
  • 46
    • 84992990420 scopus 로고    scopus 로고
    • Will internet sabotage hit home
    • Washburn, F. (2008), “Will internet sabotage hit home”, PC Magazine, Vol. 27 No. 7, pp. 17-18.
    • (2008) PC Magazine , vol.27 , Issue.7 , pp. 17-18
    • Washburn, F.1
  • 47
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: threats to information security
    • Whitman, M. (2003), “Enemy at the gate: threats to information security”, Communications of the ACM, Vol. 46 No. 8, pp. 91-5.
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.1
  • 48
    • 76649088212 scopus 로고    scopus 로고
    • Five ways insiders exploit your network
    • Whitney, B. and Condon, T. (2008), “Five ways insiders exploit your network”, Network World, Vol. 25 No. 19, p. 25.
    • (2008) Network World , vol.25 , Issue.19 , pp. 25
    • Whitney, B.1    Condon, T.2
  • 52
    • 38649139089 scopus 로고    scopus 로고
    • A needs-based model of reconciliation: satisfying the differential needs of victim and perpetrator
    • Schnabel, N. and Nadler, A. (2008), “A needs-based model of reconciliation: satisfying the differential needs of victim and perpetrator”, Journal of Personality and Social Psychology, Vol. 94 No. 1, pp. 116-32.
    • (2008) Journal of Personality and Social Psychology , vol.94 , Issue.1 , pp. 116-132
    • Schnabel, N.1    Nadler, A.2
  • 53
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M. (2000), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.