메뉴 건너뛰기




Volumn 17, Issue 5, 2009, Pages 388-407

Effects on employees' information security abilities by e-learning

Author keywords

Data security; E learning; Employees; Individual behaviour; Training

Indexed keywords

BEFORE AND AFTER; CONTROL GROUPS; DATA SECURITY; DESIGN/METHODOLOGY/APPROACH; E-LEARNING TOOL; FOLLOW-UP STUDIES; INDIVIDUAL BEHAVIOUR; INFORMATION SECURITY; INFORMATION SECURITY AWARENESS; LONG-TERM EFFECTS; TIME EFFECT;

EID: 76649144189     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220911006687     Document Type: Article
Times cited : (27)

References (36)
  • 1
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Albrechtsen, E. (2007), "A qualitative study of users' view on information security", Computers & Security, Vol.26 No.4, pp. 276-289
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 7
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in IS security research: Towards socio-organizational perspectives
    • Dhillon, G. and Backhouse, J. (2001), "Current directions in IS security research: towards socio-organizational perspectives", Information Systems Journal, Vol.11 No.2, pp. 127-153
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 9
    • 76649098428 scopus 로고    scopus 로고
    • Forsvarsdepartementet, The Norwegian Security Act Forsvarsdepartementet, Oslo
    • Forsvarsdepartementet (1998), Lov om forebyggende sikkerhetstjeneste (Sikkerhetsloven). The Norwegian Security Act, Forsvarsdepartementet, Oslo.
    • (1998) Lov Om Forebyggende Sikkerhetstjeneste (Sikkerhetsloven)
  • 10
    • 19944387279 scopus 로고    scopus 로고
    • Why users cannot use security
    • Furnell, S. (2005), "Why users cannot use security", Computers &Security, Vol.24 No.4, pp. 274-279
    • (2005) Computers &security , vol.24 , Issue.4 , pp. 274-279
    • Furnell, S.1
  • 11
    • 0028245888 scopus 로고
    • Intervention research in occupational health and safety
    • Goldenhar, L.M. and Schulte, P.A. (1994), "Intervention research in occupational health and safety", Journal of Occupational Medicine, Vol.36 No.7, pp. 763-775
    • (1994) Journal of Occupational Medicine , vol.36 , Issue.7 , pp. 763-775
    • Goldenhar, L.M.1    Schulte, P.A.2
  • 14
    • 54949146918 scopus 로고    scopus 로고
    • Implementation and effectiveness of organizational information security measures
    • Hagen, J.M., Albrechtsen, E. and Hovden, J. (2008a), "Implementation and effectiveness of organizational information security measures", Information Management & Computer Security, Vol.16 No.4, pp. 377-397
    • (2008) Information Management & Computer Security , vol.16 , Issue.4 , pp. 377-397
    • Hagen, J.M.1    Albrechtsen, E.2    Hovden, J.3
  • 15
    • 48249098547 scopus 로고    scopus 로고
    • Protection against unauthorized access and computer crime in Norwegian enterprises
    • Hagen, J.M., Kalberg-Sivertsen, T. and Rong, C. (2008b), "Protection against unauthorized access and computer crime in Norwegian enterprises", Journal of Computer Security, Vol.16, pp. 341-366
    • (2008) Journal of Computer Security , vol.16 , pp. 341-366
    • Hagen, J.M.1    Kalberg-Sivertsen, T.2    Rong, C.3
  • 19
    • 20444485671 scopus 로고    scopus 로고
    • Risk attitudes and behavior among Norwegian adolescents: The effects of a behavior modification program and a traffic safety campaign
    • Iversen, H., Rundmo, T. and Klempe, H. (2005), "Risk attitudes and behavior among Norwegian adolescents: the effects of a behavior modification program and a traffic safety campaign", European Psychologist, Vol.10 No.1, pp. 25-38.
    • (2005) European Psychologist , vol.10 , Issue.1 , pp. 25-38
    • Iversen, H.1    Rundmo, T.2    Klempe, H.3
  • 20
    • 0036924324 scopus 로고    scopus 로고
    • A new approach to risk evaluation and management: Risk-based, precaution-based, and discourse-based strategies
    • Klinke, A. and Renn, O. (2002), "A new approach to risk evaluation and management: risk-based, precaution-based, and discourse-based strategies", Risk Analysis, Vol.22 No.6, pp. 1071-1094
    • (2002) Risk Analysis , vol.22 , Issue.6 , pp. 1071-1094
    • Klinke, A.1    Renn, O.2
  • 21
    • 14544293554 scopus 로고    scopus 로고
    • Intervention studies in occupational epidemiology
    • Kristensen, T.S. (2005), "Intervention studies in occupational epidemiology", Occupational and Environmental Medicine, Vol.62 No.3, pp. 205-210
    • (2005) Occupational and Environmental Medicine , vol.62 , Issue.3 , pp. 205-210
    • Kristensen, T.S.1
  • 22
    • 0001859044 scopus 로고
    • A technique for the measurement of attitudes
    • Likert, R. (1932), "A technique for the measurement of attitudes", Archives of Psychology, Vol.140, pp. 1-55.
    • (1932) Archives of Psychology , vol.140 , pp. 1-55
    • Likert, R.1
  • 23
    • 1342308300 scopus 로고    scopus 로고
    • Accident prevention: Presentation of a model placing emphasis on human, structural, and cultural factors
    • Lund, J. and Aarø, L.E. (2004), "Accident prevention: presentation of a model placing emphasis on human, structural, and cultural factors", Safety Science, Vol.42 No.4, pp. 271-324.
    • (2004) Safety Science , vol.42 , Issue.4 , pp. 271-324
    • Lund, J.1    Aarø, L.E.2
  • 24
    • 29544451552 scopus 로고    scopus 로고
    • What we teach students about the Hawthorne studies: A review of content within a sample of introductory I-O and OB textbooks
    • Olson, R., Verley, J., Santos, L. and Salas, C. (2004), "What we teach students about the Hawthorne studies: a review of content within a sample of introductory I-O and OB textbooks", The Industrial-organizational Psychologist, Vol.41 No.3.
    • (2004) The Industrial-organizational Psychologist , vol.41 , Issue.3
    • Olson, R.1    Verley, J.2    Santos, L.3    Salas, C.4
  • 25
    • 0031279121 scopus 로고    scopus 로고
    • Risk management in a dynamic society: A modeling problem
    • Rasmussen, J. (1997), "Risk management in a dynamic society: a modeling problem", Safety Science, Vol.17 Nos 2/3, pp. 183-213.
    • (1997) Safety Science , vol.17 , Issue.2-3 , pp. 183-213
    • Rasmussen, J.1
  • 28
    • 79952335648 scopus 로고
    • Atferdsvitenskaplig sikkerhetsforskning
    • SINTEF, Trondheim (in Norwegian)
    • Rundmo, T. (1990), Atferdsvitenskaplig sikkerhetsforskning (Safety Research on Behavior), SINTEF Report STF75A9007, SINTEF, Trondheim (in Norwegian).
    • (1990) SINTEF Report STF75A9007
    • Rundmo, T.1
  • 30
    • 1242263792 scopus 로고    scopus 로고
    • Security training and awareness: Fitting a square peg in a round hole
    • Schultz, E. (2004), "Security training and awareness: fitting a square peg in a round hole", Computers & Security, Vol.23 No.1, pp. 1-2.
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 1-2
    • Schultz, E.1
  • 31
    • 24644438691 scopus 로고    scopus 로고
    • The human factor in security
    • Schultz, E. (2005), "The human factor in security", Computers & Security, Vol.24 No.6, pp. 425-426
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 425-426
    • Schultz, E.1
  • 32
    • 33744520370 scopus 로고    scopus 로고
    • Towards an information security competence maturity model
    • Thomson, K.-L. and von Solms, R. (2006), "Towards an information security competence maturity model", Computer Fraud & Security, No.5, pp. 11-15.
    • (2006) Computer Fraud & Security , vol.5 , pp. 11-15
    • Thomson, K.-L.1    Von Solms, R.2
  • 35
    • 0036299647 scopus 로고    scopus 로고
    • The development of access control policies for information technology systems
    • Ward, P. and Smith, C.L. (2002), "The development of access control policies for information technology systems", Computers & Security, Vol.21 No.4, pp. 365-371
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 365-371
    • Ward, P.1    Smith, C.L.2
  • 36
    • 24644439555 scopus 로고    scopus 로고
    • Information security policy's impact on reporting security incidents
    • Wiant, T.L. (2005), "Information security policy's impact on reporting security incidents", Computers & Security, Vol.24 No.6, pp. 448-459
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 448-459
    • Wiant, T.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.