메뉴 건너뛰기




Volumn , Issue , 2009, Pages 47-58

The compliance budget: Managing security behaviour in organisations

Author keywords

Compliance; Compliance budget; Security behaviour; Security policies

Indexed keywords

COST AND BENEFITS; COSTS AND BENEFITS; EMPLOYEE'S PERCEPTIONS; KEY FACTORS; NEW APPROACHES; SECURITY BREACHES; SECURITY GOALS; SECURITY MANAGER; SECURITY MEASURE; SECURITY POLICY; USABLE SECURITY;

EID: 77950564668     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1595676.1595684     Document Type: Conference Paper
Times cited : (207)

References (18)
  • 1
    • 0004084586 scopus 로고
    • Routledge
    • J. Adams (1995) Risk. Routledge.
    • (1995) Risk
    • Adams, J.1
  • 2
    • 0043232732 scopus 로고    scopus 로고
    • Users Are Not the Enemy: Why users compromise security mechanisms and how to take remedial measures
    • December 1999
    • A. Adams & M. A. Sasse (1999): Users Are Not The Enemy: Why users compromise security mechanisms and how to take remedial measures. Communications of the ACM, 42 (12), pp. 40-46 December 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 8
    • 34250015784 scopus 로고    scopus 로고
    • Embedding Information Security into the Organisation
    • May/June 2007
    • M. Eric Johnson & Eric Goetz (2007): Embedding Information Security into the Organisation. IEEE Security & Privacy May/June 2007 pp 16-24.
    • (2007) IEEE Security & Privacy , pp. 16-24
    • Johnson, M.E.1    Goetz, E.2
  • 11
    • 0002485160 scopus 로고
    • Some Observations on Mental Models
    • Gentner, D. A. & Stevens, A. A. [Eds.] Hillsdale, NJ: Erlbaum
    • Norman, D. A. (1983): Some Observations on Mental Models. In Gentner, D. A. & Stevens, A. A. [Eds.] Mental models. Hillsdale, NJ: Erlbaum.
    • (1983) Mental Models
    • Norman, D.A.1
  • 15
    • 71749106527 scopus 로고    scopus 로고
    • Unpublished PhD Thesis, Department of Computer Science, University College London, UK
    • Weirich (2005): Persuasive Password Security. Unpublished PhD Thesis, Department of Computer Science, University College London, UK.
    • (2005) Persuasive Password Security
    • Weirich1
  • 17
    • 77950579996 scopus 로고    scopus 로고
    • User Interaction Design for Secure Systems
    • L. Faith Cranor & S. Garfinkel [Eds.]: 2005 O'Reilly Books
    • Yee, K P. (2005) User Interaction Design for Secure Systems. In L. Faith Cranor & S. Garfinkel [Eds.]: Security and Usability: Designing secure systems that people can use 2005. pp 13-30. O'Reilly Books.
    • (2005) Security and Usability: Designing Secure Systems That People Can Use , pp. 13-30
    • Yee, K.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.