메뉴 건너뛰기




Volumn , Issue , 2010, Pages 196-203

An analysis of information security awareness within home and work environments

Author keywords

Information security; Information security awareness; Security culture; Security management

Indexed keywords

AWARENESS RAISING; HOME ENVIRONMENT; HOME USERS; INFORMATION SECURITY; INFORMATION SECURITY AWARENESS; NATIONAL PROGRAM; ORGANIZATIONAL AWARENESS; SECURITY MANAGEMENT; WORK ENVIRONMENTS;

EID: 77952330680     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2010.27     Document Type: Conference Paper
Times cited : (79)

References (32)
  • 1
    • 9544241345 scopus 로고    scopus 로고
    • Hacking gains momentum
    • S. Hinde, "Hacking gains momentum," Computer Fraud & Security, vol. 2004, pp. 13-15, 2004.
    • (2004) Computer Fraud & Security , vol.2004 , pp. 13-15
    • Hinde, S.1
  • 4
    • 0003487308 scopus 로고    scopus 로고
    • Indiana: Wiley Publishing, Inc.
    • B. Schneier, Secrets and lies. Indiana: Wiley Publishing, Inc., 2000.
    • (2000) Secrets and Lies
    • Schneier, B.1
  • 6
    • 78049400376 scopus 로고    scopus 로고
    • BERR Department for Business Enterprise and Regulatory Reform & Pricewaterhouse Coopers, United Kingdom
    • BERR, "The 9th information security breaches survey," Department for Business Enterprise and Regulatory Reform & Pricewaterhouse Coopers, United Kingdom 2008.
    • (2008) The 9th Information Security Breaches Survey
  • 11
    • 33750302951 scopus 로고    scopus 로고
    • Information security governance: Due care
    • R. von Solms and S. H. von Solms, "Information security governance: Due care," Computers & Security, vol. 25, pp. 494-497, 2006.
    • (2006) Computers & Security , vol.25 , pp. 494-497
    • Von Solms, R.1    Von Solms, S.H.2
  • 13
    • 77952381412 scopus 로고    scopus 로고
    • How to create a security culture in your organization
    • G. Rotvold, "How to Create a Security Culture in Your Organization," Information Management Journal, vol. 42, pp. 32-38, 11 2008.
    • (2008) Information Management Journal , vol.42 , Issue.11 , pp. 32-38
    • Rotvold, G.1
  • 14
    • 61349200300 scopus 로고    scopus 로고
    • From culture to disobedience: Recognising the varying user acceptance of IT security
    • S. Furnell and K.-L. Thomson, "From culture to disobedience: Recognising the varying user acceptance of IT security," Computer Fraud & Security, vol. 2009, pp. 5-10, 2009.
    • (2009) Computer Fraud & Security , vol.2009 , pp. 5-10
    • Furnell, S.1    Thomson, K.-L.2
  • 15
    • 0033657872 scopus 로고    scopus 로고
    • Information security - The third wave?
    • B. von Solms, "Information Security - The Third Wave?," Computers & Security, vol. 19, pp. 615-620, 2000.
    • (2000) Computers & Security , vol.19 , pp. 615-620
    • Von Solms, B.1
  • 21
    • 0043219327 scopus 로고
    • Information security awareness raising methods
    • C. C. Wood, "Information security awareness raising methods," Computer Fraud & Security Bulletin, vol. 1995, pp. 13-15, 1995.
    • (1995) Computer Fraud & Security Bulletin , vol.1995 , pp. 13-15
    • Wood, C.C.1
  • 25
    • 77952379395 scopus 로고    scopus 로고
    • The new users' guide: How to raise information security awareness
    • ENISA
    • ENISA, "The new users' guide: How to raise information security awareness," European Network and Information Security Agency 2008.
    • (2008) European Network and Information Security Agency
  • 26
  • 27
    • 54949138901 scopus 로고    scopus 로고
    • A cross-cultural investigation of situational information security awareness programs
    • C. C. Chen, B. D. Medlin, and R. S. Shaw, "A cross-cultural investigation of situational information security awareness programs," Information Management & Computer Security, vol. 16, pp. 360-376, 2008.
    • (2008) Information Management & Computer Security , vol.16 , pp. 360-376
    • Chen, C.C.1    Medlin, B.D.2    Shaw, R.S.3
  • 28
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • E. Albrechtsen, "A qualitative study of users' view on information security," Computers & Security, vol. 26, pp. 276-289, 2007.
    • (2007) Computers & Security , vol.26 , pp. 276-289
    • Albrechtsen, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.