메뉴 건너뛰기




Volumn 43, Issue 2, 2010, Pages 64-71

Compliance with information security policies: An empirical investigation

Author keywords

Deterrence theory; Information security policy; Protection motivation theory; Security; Security and privacy

Indexed keywords


EID: 77149132467     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/MC.2010.35     Document Type: Article
Times cited : (183)

References (18)
  • 1
    • 0036299585 scopus 로고    scopus 로고
    • Security surveys spring crop
    • S. Hinde, "Security Surveys Spring Crop," Computers & Security, vol.21, no.4, 2002, pp. 310-321.
    • (2002) Computers & Security , vol.21 , Issue.4 , pp. 310-321
    • Hinde, S.1
  • 2
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in information security research: Toward socio-organizational Perspectives
    • G. Dhillon and J. Backhouse, "Current Directions in Information Security Research: Toward Socio-Organizational Perspectives," Information Systems J., vol.11, no.2, 2001, pp. 127-153
    • (2001) Information Systems J. , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 3
    • 17844366573 scopus 로고    scopus 로고
    • An Analysis of end user security behaviors
    • J.M. Stanton et al., "An Analysis of End User Security Behaviors," Computers & Security, vol.24, 2005, pp. 124-133.
    • (2005) Computers & Security , vol.24 , pp. 124-133
    • Stanton, J.M.1
  • 10
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory
    • J. Cacioppo and R. Petty, eds., Guilford Press
    • R.W. Rogers, "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory," Social Psychophysiology, J. Cacioppo and R. Petty, eds., Guilford Press, 1983, pp. 153-176.
    • (1983) Social Psychophysiology , pp. 153-176
    • Rogers, R.W.1
  • 12
    • 0023304222 scopus 로고
    • Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
    • S. Rippetoe and R.W. Rogers, "Effects of Components of Protection-Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat," J. Personality and Social Psychology, vol.52, no.3, 1987, pp. 596-604.
    • (1987) J. Personality and Social Psychology , vol.52 , Issue.3 , pp. 596-604
    • Rippetoe, S.1    Rogers, R.W.2
  • 13
    • 57049117189 scopus 로고    scopus 로고
    • Persuasion as education for computer security
    • AACE
    • A. Forget, S. Chiasson, and R. Biddle, "Persuasion as Education for Computer Security," Proc. E-Learn 2007, AACE, 2007, pp. 822-829.
    • (2007) Proc. E-Learn 2007 , pp. 822-829
    • Forget, A.1    Chiasson, S.2    Biddle, R.3
  • 14
    • 0017472917 scopus 로고
    • Self-Efficacy: Toward a unifying theory of behaviour change
    • A. Bandura, "Self-Efficacy: Toward a Unifying Theory of Behaviour Change," Psychological Rev., vol.84, no.2, 1977, pp. 191-215.
    • (1977) Psychological Rev. , vol.84 , Issue.2 , pp. 191-215
    • Bandura, A.1
  • 18
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • V. Venkatesh et al., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, vol.27, no.3, 2003, pp. 425-478.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.