메뉴 건너뛰기




Volumn 34, Issue 4, 2010, Pages 757-778

Improving employees' compliance through information systems security training: An action research study

Author keywords

Employees' compliance with security policies; IS security; IS security training

Indexed keywords

CURRICULA; INFORMATION SYSTEMS; INFORMATION USE; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 78650770842     PISSN: 02767783     EISSN: None     Source Type: Journal    
DOI: 10.2307/25750704     Document Type: Article
Times cited : (518)

References (78)
  • 2
    • 0000784219 scopus 로고
    • Punishment in organizations: A review, propositions, and research suggestions
    • Arvey, R. D., and Ivancevich, J. M. 1980. "Punishment in Organizations: A Review, Propositions, and Research Suggestions," The Academy of Management Review (5:1), pp. 123-132.
    • (1980) The Academy of Management Review , vol.5 , Issue.1 , pp. 123-132
    • Arvey, R.D.1    Ivancevich, J.M.2
  • 3
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in is security research: Toward socio-organizational perspectives
    • Backhouse, J., and Dhillon, G. 2001. "Current Directions in IS Security Research: Toward Socio-Organizational Perspectives," Information Systems Journal (11:2), pp. 127-153.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Backhouse, J.1    Dhillon, G.2
  • 5
    • 16344391307 scopus 로고    scopus 로고
    • Special issue on action research in information systems: Making is relevant to practice-foreword
    • Baskerville, R., and Myers, M. 2004. "Special Issue on Action Research in Information Systems: Making IS Relevant to Practice-Foreword," MIS Quarterly (28:3), 329-335.
    • (2004) MIS Quarterly , vol.28 , Issue.3 , pp. 329-335
    • Baskerville, R.1    Myers, M.2
  • 7
    • 22044451957 scopus 로고    scopus 로고
    • Diversity in information systems action research methods
    • 1998
    • Baskerville, R. and Wood-Harper, T. 1998. "Diversity in Information Systems Action Research Methods," European Journal of Information Systems (7:2), 1998, pp. 90-107.
    • (1998) European Journal of Information Systems , vol.7 , Issue.2 , pp. 90-107
    • Baskerville, R.1    Wood-Harper, T.2
  • 12
    • 84992963195 scopus 로고    scopus 로고
    • Raising is security awareness in the academic setting
    • Cox, A., Connolly, S., and Currall, J. 2001. "Raising IS Security Awareness in the Academic Setting," VINE (31:2), pp. 11-16.
    • (2001) VINE , vol.31 , Issue.2 , pp. 11-16
    • Cox, A.1    Connolly, S.2    Currall, J.3
  • 17
    • 85050754880 scopus 로고
    • Realism and instrumentalism
    • M. Bunge (ed.) , London: Free Press of Glencoe
    • Feyerabend, P. K. 1964. "Realism and Instrumentalism," in The Critical Approach to Science and Philosophy, M. Bunge (ed.), London: Free Press of Glencoe, pp. 280-308.
    • (1964) The Critical Approach to Science and Philosophy , pp. 280-308
    • Feyerabend, P.K.1
  • 20
    • 0002955225 scopus 로고
    • Choosing information systems research approaches
    • R. D. Galliers (ed.) , Oxford, England: Blackwell Scientific Publications
    • Galliers, R. D. 1992. "Choosing Information Systems Research Approaches," in Information Systems Research: Issues, Methods, and Practical Guidelines, R. D. Galliers (ed.), Oxford, England: Blackwell Scientific Publications, pp. 144-162.
    • (1992) Information Systems Research: Issues, Methods, and Practical Guidelines , pp. 144-162
    • Galliers, R.D.1
  • 22
    • 0032032029 scopus 로고    scopus 로고
    • Installing an appropriate information security policy
    • DOI 10.1016/S1386-5056(98)00022-7, PII S1386505698000227, Common Security Solutions for Communicating Patient Data
    • Gaunt, N. 1998. "Installing an Appropriate IS Security Policy [in Hospitals]," International Journal of Medical Informatics (49:1), pp. 131-134. (Pubitemid 28353814)
    • (1998) International Journal of Medical Informatics , vol.49 , Issue.1 , pp. 131-134
    • Gaunt, N.1
  • 23
    • 79953283167 scopus 로고
    • The design of instruction
    • M. D. Merrill (ed.), Englewood Cliffs, NJ: Prentice-Hall
    • Glaser, R. 1971. "The Design of Instruction," in Instructional Design: Readings, M. D. Merrill (ed.), Englewood Cliffs, NJ: Prentice-Hall.
    • (1971) Instructional Design: Readings
    • Glaser, R.1
  • 24
    • 0001823869 scopus 로고
    • Security concerns of system users: A study of perceptions of the adequacy of security
    • Goodhue, D. L., and Straub, D. W. 1991. "Security Concerns of System Users: A Study of Perceptions of the Adequacy of Security," Information & Management (20), pp.13- 27.
    • (1991) Information & Management , vol.20 , pp. 13-27
    • Goodhue, D.L.1    Straub, D.W.2
  • 25
    • 0002615353 scopus 로고
    • Cognitive learning, cognitive response to persuasion, and attitude change
    • A. G. Greenwald, T. C. Brock, and T M
    • Greenwald, A. G. 1968. "Cognitive Learning, Cognitive Response to Persuasion, and Attitude Change," in Psychological Foundations of Attitudes, A. G. Greenwald, T. C. Brock, and T. M.
    • (1968) Psychological Foundations of Attitudes
    • Greenwald, A.G.1
  • 26
    • 79953285328 scopus 로고    scopus 로고
    • Ostrom (eds.), San Diego, CA: Academic Press, pp.147-170
    • Ostrom (eds.), San Diego, CA: Academic Press, pp. 147-170
  • 28
    • 79953267144 scopus 로고    scopus 로고
    • Is security management: An awareness campaign
    • C. J. Armstrong and R. J. Hartley (eds.), Manchester, England, July
    • Hadland, T. 1998. "IS Security Management: An Awareness Campaign," in UKOLUG98: New Networks, Old Information- UKOLUG's 20th Birthday Conference, C. J. Armstrong and R. J. Hartley (eds.), Manchester, England, July 14-16.
    • (1998) UKOLUG98: New Networks, Old Information- UKOLUG's 20th Birthday Conference , pp. 14-16
    • Hadland, T.1
  • 29
    • 85071343148 scopus 로고    scopus 로고
    • Theories of learning and computer-mediated instructional technologies
    • Hung, D. 2001. "Theories of Learning and Computer-Mediated Instructional Technologies," Educational Media International (38:4), pp. 281-287.
    • (2001) Educational Media International , vol.38 , Issue.4 , pp. 281-287
    • Hung, D.1
  • 32
    • 27744519235 scopus 로고    scopus 로고
    • The effect of top management support of SISP on strategic IS management: Insights from the US electric power industry
    • DOI 10.1016/j.omega.2004.10.008, PII S0305048304001598
    • Kearns, G. 2006. "The Effect of Top Management Support of SISP on Strategic IS Management: Insights from the US Electric Power Industry," Omega (34:3), pp. 236-253. (Pubitemid 41600562)
    • (2006) Omega , vol.34 , Issue.3 , pp. 236-253
    • Kearns, G.S.1
  • 34
    • 55849147710 scopus 로고
    • Training as part of a security awareness program
    • Lafleur, L. M. 1992. "Training as Part of a Security Awareness Program," Computer Control Quarterly (10:4), pp. 4-11.
    • (1992) Computer Control Quarterly , vol.10 , Issue.4 , pp. 4-11
    • Lafleur, L.M.1
  • 35
    • 0002479337 scopus 로고
    • Falsification and the methodology of scientific research programmes
    • I. Lakatos and A. Musgrave (eds), Cambridge, UK: Cambridge University Press
    • Lakatos, I. 1970. "Falsification and the Methodology of Scientific Research Programmes," in Criticism and the Growth of Knowledge, I. Lakatos and A. Musgrave (eds), Cambridge, UK: Cambridge University Press, pp. 91-196.
    • (1970) Criticism and the Growth of Knowledge , pp. 91-196
    • Lakatos, I.1
  • 36
    • 0004235034 scopus 로고
    • Berkeley, CA: University of California Press
    • Laudan, L. 1984. Science and Values, Berkeley, CA: University of California Press.
    • (1984) Science and Values
    • Laudan, L.1
  • 37
    • 0001921246 scopus 로고
    • Personality and attitude change: An information-processing theory
    • A. G. Greenwald, T. C. Brock, and M. T. Ostrom (eds.), San Diego: Academic Press
    • McGuire, W. J. 1968. "Personality and Attitude Change: An Information-Processing Theory," in A. G. Greenwald, T. C. Brock, and M. T. Ostrom (eds.), Psychological Foundations of Attitudes, San Diego: Academic Press, pp. 171-196.
    • (1968) Psychological Foundations of Attitudes , pp. 171-196
    • McGuire, W.J.1
  • 39
    • 33846313618 scopus 로고    scopus 로고
    • The qualitative interview in is research: Examining the craft
    • Myers, M., and Newman, M. 2007. "The Qualitative Interview in IS Research: Examining the Craft," Information and Organization (171), pp. 2-26.
    • (2007) Information and Organization , Issue.171 , pp. 2-26
    • Myers, M.1    Newman, M.2
  • 41
    • 73849124985 scopus 로고
    • Running corporate and national security awareness programs
    • Amsterdam: North- Holland Publishing Co.
    • Murray, B. 1991. "Running Corporate and National Security Awareness Programs," in Proceedings of the FIP TC11 Seventh International Conference on IS Security, Amsterdam: North- Holland Publishing Co., pp. 203-207.
    • (1991) Proceedings of the FIP TC11 Seventh International Conference on IS Security , pp. 203-207
    • Murray, B.1
  • 42
    • 9744264932 scopus 로고    scopus 로고
    • Dialogical action research at omega corporation
    • Mårtensson, P., and Lee, A. S. 2004. "Dialogical Action Research at Omega Corporation," MIS Quarterly (28:3), pp. 507-536.
    • (2004) MIS Quarterly , vol.28 , Issue.3 , pp. 507-536
    • Mårtensson, P.1    Lee, A.S.2
  • 44
    • 6744258985 scopus 로고    scopus 로고
    • NIST, NIST Special Publication 800-16 U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology
    • NIST. "Information echnology Security Training Requirements: A Role- and Performance-Based Model," NIST Special Publication 800-16, U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology (available at http://csrc.nist.gov/publications/ nistpubs/800-16/ 800-16.pdf).
    • Information Echnology Security Training Requirements: A Role- And Performance-Based Model
  • 46
    • 0033698868 scopus 로고    scopus 로고
    • How to build a comprehensive security awareness program
    • Peltier, T. 2002. "How to Build a Comprehensive Security Awareness Program," Computer Security Journal (16:2), pp. 23-32.
    • (2002) Computer Security Journal , vol.16 , Issue.2 , pp. 23-32
    • Peltier, T.1
  • 50
    • 0002273518 scopus 로고
    • Issue involvement as a moderator of the effects on attitude of advertising content and context
    • Petty, R. E., and Cacioppo, J. T. 1981b. "Issue Involvement as a Moderator of the Effects on Attitude of Advertising Content and Context," Advances in Consumer Research (8), pp. 20-24.
    • (1981) Advances in Consumer Research , vol.8 , pp. 20-24
    • Petty, R.E.1    Cacioppo, J.T.2
  • 51
    • 0001132217 scopus 로고
    • Source factors and the elaboration likelihood model of persuasion
    • Petty, R. E., and Cacioppo, J. T. 1984. "Source Factors and the Elaboration Likelihood Model of Persuasion," Advances in Consumer Research (11), pp. 668-672.
    • (1984) Advances in Consumer Research , vol.11 , pp. 668-672
    • Petty, R.E.1    Cacioppo, J.T.2
  • 52
    • 77953970829 scopus 로고
    • The elaboration likelihood model of persuasion
    • L. Berkowitz (ed.) , San Diego: Academic Press
    • Petty, R. E., and Cacioppo, J. T. 1986. "The Elaboration Likelihood Model of Persuasion," in Advances in Experimental Social Psychology (19), L. Berkowitz (ed.), San Diego: Academic Press, pp. 123-205.
    • (1986) Advances in Experimental Social Psychology , vol.19 , pp. 123-205
    • Petty, R.E.1    Cacioppo, J.T.2
  • 54
    • 4143143530 scopus 로고    scopus 로고
    • The secured enterprise: Protecting your information assets
    • NJ: Prentice Hall
    • Proctor, P. E., and Byrnes, F. C. 2002. The Secured Enterprise: Protecting Your Information Assets, Upper Saddle River, NJ: Prentice Hall.
    • (2002) Upper Saddle River
    • Proctor, P.E.1    Byrnes, F.C.2
  • 56
    • 0001945885 scopus 로고
    • Background: Theory and research
    • J. R. Rest and D. Narvaéz (eds.) , Hillsdale, JJ: Lawrence Erlbaum Associates
    • Rest, J. R. 1994. "Background: Theory and Research," in Moral Development in the Professions: Psychology and Applied Ethics, J. R. Rest and D. Narvaéz (eds.), Hillsdale, JJ: Lawrence Erlbaum Associates, pp. 1-26.
    • (1994) Moral Development in the Professions: Psychology and Applied Ethics , pp. 1-26
    • Rest, J.R.1
  • 57
    • 79953267586 scopus 로고    scopus 로고
    • Communicating highway safety: What works
    • Center for Transportation Research and Education, Iowa State University, Ames, Iowa
    • Rodriguez, L., and Anderson-Wilk, M. 2002. "Communicating Highway Safety: What Works," CTRE Project 01-85, Iowa Safety Management System, Center for Transportation Research and Education, Iowa State University, Ames, Iowa (available at http://ntl.bts.gov/lib/22000/22800/22892/chs.pdf).
    • (2002) CTRE Project 01-85, Iowa Safety Management System
    • Rodriguez, L.1    Anderson-Wilk, M.2
  • 59
    • 36448948749 scopus 로고    scopus 로고
    • Security awareness
    • (4th ed.), S. Bosworth and M. E. Kabay (eds.) , New York: John Wiley & Sons, 1-29.19
    • Rudolph, K., Warshawsky, G., and Numkin, L. 2002. "Security Awareness," in Computer Security Handbook (4th ed.), S. Bosworth and M. E. Kabay (eds.), New York: John Wiley & Sons, pp. 29.1-29.19.
    • (2002) Computer Security Handbook , pp. 29
    • Rudolph, K.1    Warshawsky, G.2    Numkin, L.3
  • 60
    • 85070019893 scopus 로고    scopus 로고
    • On the architectonics of instructional theory
    • Theory, Research, and Models, R. D. Tennyson, F. Schott, N. Seel, and S. Dijkstra (eds.) ,Mahwah, NJ: Lawrence Erlbaum Associates
    • Schott, F., and Driscoll, M. P. 1997. "On the Architectonics of Instructional Theory," in Instructional Design: International Perspective, Vol. 1, Theory, Research, and Models, R. D. Tennyson, F. Schott, N. Seel, and S. Dijkstra (eds.),Mahwah, NJ: Lawrence Erlbaum Associates, pp. 135-173.
    • (1997) Instructional Design: International Perspective , vol.1 , pp. 135-173
    • Schott, F.1    Driscoll, M.P.2
  • 62
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational is security awareness
    • Siponen, M. 2000a. "A Conceptual Foundation for Organizational IS Security Awareness," Information Management & Computer Security (8:1), pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 66
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • Straub, D. W. 1990. "Effective IS Security: An Empirical Study," Information Systems Research (1:3), pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 67
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D. W., and Welke, R. J. 1998. "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly (22:4), pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 68
    • 79953278252 scopus 로고
    • Security awareness programs: A proactive approach
    • Telders, E. 1991. "Security Awareness Programs: A Proactive Approach," Computer Security Journal (7:2), pp. 57-64.
    • (1991) Computer Security Journal , vol.7 , Issue.2 , pp. 57-64
    • Telders, E.1
  • 70
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, M. E. and von Solms, R. "IS Security Awareness: Educating Your Users Effectively," Information Management & Computer Security (6:4), 1998, pp. 167-173. (Pubitemid 128623423)
    • (1998) Information Management and Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 72
    • 0001897127 scopus 로고    scopus 로고
    • Information security management: Why standards are important
    • von Solms, R. 1999. "Information Security Management: Why Standards Are Important," Information Management and Computer Security (7:1), pp. 50-58.
    • (1999) Information Management and Computer Security , vol.7 , Issue.1 , pp. 50-58
    • Von Solms, R.1
  • 75
    • 33746641326 scopus 로고    scopus 로고
    • Doing interpretive research
    • DOI 10.1057/palgrave.ejis.3000589, PII 3000589
    • Walsham, G. 2o06. "Doing Interpretive Research," European Journal of Information Systems (15:3), pp. 320-330. (Pubitemid 44146931)
    • (2006) European Journal of Information Systems , vol.15 , Issue.3 , pp. 320-330
    • Walsham, G.1
  • 76
    • 0043219327 scopus 로고
    • Information security awareness raising methods
    • June
    • Wood, C. C. 1995. "Information Security Awareness Raising Methods," Computer Fraud & Security Bulletin, June, pp. 13-15.
    • (1995) Computer Fraud & Security Bulletin , pp. 13-15
    • Wood, C.C.1
  • 77
    • 0036884659 scopus 로고    scopus 로고
    • The human firewall manifesto
    • Wood, C. C. 2002. "The Human Firewall Manifesto," Computer Security Journal (18:1), pp. 15-18. (Pubitemid 35017348)
    • (2002) Computer Security Journal , vol.18 , Issue.1 , pp. 15-18
    • Wood, C.C.1
  • 78
    • 84996570963 scopus 로고    scopus 로고
    • Improving Security from the Ground Up
    • Wylder, J. O. 2003. "Improving Security From the Ground Up," Information Systems Security (11:6), pp. 29-38. (Pubitemid 36154092)
    • (2003) INFORMATION SYSTEMS SECURITY , vol.11 , Issue.6 , pp. 29-38
    • Wylder, J.O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.