메뉴 건너뛰기




Volumn 111, Issue 4, 2011, Pages 570-588

The more secure the better? A study of information security readiness

Author keywords

Data security; Information technology; Risk management

Indexed keywords

AFFECTIVE RESPONSE; COVARIATES; DATA SECURITY; DESIGN/METHODOLOGY/APPROACH; FACTORIAL DESIGN; INDIVIDUAL DIFFERENCES; INFORMATION SECURITY; LABORATORY EXPERIMENTS; MODERATING EFFECT; MULTI-GROUP; NON-LINEAR RELATIONSHIPS; SECURITY LEVEL; SECURITY MEASURE; SECURITY METHODS; STRUCTURAL EQUATION MODELING; UNDERGRADUATE STUDENTS; USER ATTITUDES; USER CHARACTERISTICS; USER TRAINING;

EID: 79955704302     PISSN: 02635577     EISSN: None     Source Type: Journal    
DOI: 10.1108/02635571111133551     Document Type: Article
Times cited : (28)

References (51)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Adams, A. and Sasse, M.A. (1999), "Users are not the enemy", Communications of the ACM, Vol. 42 No. 12, pp. 41-6. (Pubitemid 129568045)
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 2
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
    • Albrechtsen, E. (2007), "A qualitative study of users' view on information security", Computers and Security, Vol. 26, pp. 276-89. (Pubitemid 46873753)
    • (2007) Computers and Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 3
    • 0002545789 scopus 로고
    • Students as surrogates in behavioral accounting research: Some evidence
    • Ashton, R. and Kramer, S. (1980), "Students as surrogates in behavioral accounting research: Some evidence", Journal of Accounting Research, Vol. 18 No. 1, pp. 1-15.
    • (1980) Journal of Accounting Research , vol.18 , Issue.1 , pp. 1-15
    • Ashton, R.1    Kramer, S.2
  • 6
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard, D. and Arief, B. (2004), "Computer security impaired by legitimate users", Computers and Security, Vol. 23, pp. 229-37.
    • (2004) Computers and Security , vol.23 , pp. 229-37
    • Besnard, D.1    Arief, B.2
  • 7
    • 15044341950 scopus 로고
    • Laboratory experimentation in accounting research
    • Birnberg, J. and Nath, R. (1968), "Laboratory experimentation in accounting research", Accounting Review, Vol. 43 No. 1, pp. 38-45.
    • (1968) Accounting Review , vol.43 , Issue.1 , pp. 38-45
    • Birnberg, J.1    Nath, R.2
  • 8
    • 0021731753 scopus 로고
    • Empirical validation of affect, behavior, and cognition as distinct components of attitude
    • Breckler, S.J. (1984), "Empirical validation of affect, behavior, and cognition as distinct components of attitude", Journal of Personality and Social Psychology, Vol. 47 No. 6, pp. 1191-205.
    • (1984) Journal of Personality and Social Psychology , vol.47 , Issue.6 , pp. 1191-205
    • Breckler, S.J.1
  • 11
    • 33845770414 scopus 로고    scopus 로고
    • Initial trust and online buyer behaviour
    • Chen, Y. and Barnes, S. (2007), "Initial trust and online buyer behaviour", Industrial Management & Data Systems, Vol. 107 No. 1, p. 21.
    • (2007) Industrial Management & Data Systems , vol.107 , Issue.1 , pp. 21
    • Chen, Y.1    Barnes, S.2
  • 12
    • 21844490735 scopus 로고
    • Measuring the affective and cognitive properties of attitudes: Conceptual and methodological issues
    • Crites, S.L., Fabrigar, L.R. and Petty, R.E. (1994), "Measuring the affective and cognitive properties of attitudes: Conceptual and methodological issues", Personality and Social Psychology Bulletin, Vol. 20 No. 6, pp. 619-34.
    • (1994) Personality and Social Psychology Bulletin , vol.20 , Issue.6 , pp. 619-34
    • Crites, S.L.1    Fabrigar, L.R.2    Petty, R.E.3
  • 13
    • 0003002898 scopus 로고
    • Test reliability: Its meaning and determination
    • Cronbach, L. (1947), "Test reliability: Its meaning and determination", Psychometrika, Vol. 12 No. 1, pp. 1-16.
    • (1947) Psychometrika , vol.12 , Issue.1 , pp. 1-16
    • Cronbach, L.1
  • 14
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • Davis, F. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, Vol. 13 No. 3, pp. 319-40.
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-40
    • Davis, F.1
  • 15
    • 84936823933 scopus 로고
    • User acceptance of computer technology: A comparison of two theoretical models
    • Davis, F.D., Bagozzi, R.P. and Warshaw, P.R. (1989), "User acceptance of computer technology: A comparison of two theoretical models", Management Science, Vol. 35 No. 8, pp. 982-1003.
    • (1989) Management Science , vol.35 , Issue.8 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 16
    • 34548317576 scopus 로고    scopus 로고
    • Information security resources: A selected annotated bibliography
    • DOI 10.1300/J122v27n03-03
    • Dotson, D.S. (2007), "Information security resources: A selected annotated bibliography", Science & Technology Libraries, Vol. 27 No. 3, pp. 29-51. (Pubitemid 47337411)
    • (2007) Science and Technology Libraries , vol.27 , Issue.3 , pp. 29-51
    • Dotson, D.S.1
  • 17
    • 0003714701 scopus 로고
    • Harcourt Brace Jovanovich sCollege Publishers, Fort Worth, TX
    • Eagly, H. and Chaiken, S. (1993), The Psychology of Attitudes, Harcourt Brace Jovanovich College Publishers, Fort Worth, TX.
    • (1993) The Psychology of Attitudes
    • Eagly, H.1    Chaiken, S.2
  • 18
    • 0000203039 scopus 로고
    • The effect of framing on choice: Interactions with risk-taking propensity, cognitivestyle, and sex
    • Fagley, N. and Miller, P. (1990), "The effect of framing on choice: Interactions with risk-taking propensity, cognitivestyle, and sex", Personality and Social Psychology Bulletin, Vol. 16 No. 3, p. 496.
    • (1990) Personality and Social Psychology Bulletin , vol.16 , Issue.3 , pp. 496
    • Fagley, N.1    Miller, P.2
  • 19
    • 33646354609 scopus 로고    scopus 로고
    • Consumer trust, perceived security and privacy policy
    • Flavian, C. and Guinaliu, M. (2006), "Consumer trust, perceived security and privacy policy", Industrial Management & Data Systems, Vol. 106 No. 5, pp. 601-20.
    • (2006) Industrial Management & Data Systems , vol.106 , Issue.5 , pp. 601-20
    • Flavian, C.1    Guinaliu, M.2
  • 20
    • 0002000341 scopus 로고
    • Causal inference from panel data
    • Heise, D.R. (1970), "Causal inference from panel data", Sociological Methodology, Vol. 2, pp. 3-27.
    • (1970) Sociological Methodology , vol.2 , pp. 3-27
    • Heise, D.R.1
  • 21
    • 33644586763 scopus 로고    scopus 로고
    • Balancing performance measures for information security management: A balanced scorecard framework
    • Huang, S., Lee, C. and Kao, A. (2006), "Balancing performance measures for information security management: A balanced scorecard framework", Industrial Management & Data Systems, Vol. 106 Nos 1/2, pp. 242-55.
    • (2006) Industrial Management & Data Systems , vol.106 , Issue.1-2 , pp. 242-55
    • Huang, S.1    Lee, C.2    Kao, A.3
  • 27
    • 34548139401 scopus 로고    scopus 로고
    • The International Journal of Information Security special issue on privacy, security and trust technologies and E-business services
    • DOI 10.1007/s10207-007-0036-8
    • Knight, S., Buffett, S. and Hung, P. (2007), "Special issue on privacy, security and trust technologies and e-business services. Guest editors' introduction", International Journal of Information Security, Vol. 6 No. 5, pp. 285-6. (Pubitemid 47299555)
    • (2007) International Journal of Information Security , vol.6 , Issue.5 , pp. 285-286
    • Knight, S.1    Buffett, S.2    Hung, P.C.K.3
  • 28
    • 21044442407 scopus 로고    scopus 로고
    • Media richness or media naturalness? The evolution of our biological communication apparatus and its influence on our behavior toward e-communication tools
    • DOI 10.1109/TPC.2005.849649
    • Kock, N. (2005), "Media richness or media naturalness? The evolution of our biological communication apparatus and its influence on our behavior toward e-communication tools", IEEE Transactions on Professional Communication, Vol. 48 No. 2, pp. 117-30. (Pubitemid 40871091)
    • (2005) IEEE Transactions on Professional Communication , vol.48 , Issue.2 , pp. 117-130
    • Kock, N.1
  • 29
    • 0015117222 scopus 로고
    • Validation of feeling, belief, and intention to act as three components of attitude and their contribution to prediction of contraceptive behavior
    • Kothandapani, V. (1971), "Validation of feeling, belief, and intention to act as three components of attitude and their contribution to prediction of contraceptive behavior", Journal of Personality and Social Psychology, Vol. 19 No. 3, pp. 321-33.
    • (1971) Journal of Personality and Social Psychology , vol.19 , Issue.3 , pp. 321-33
    • Kothandapani, V.1
  • 30
    • 15044345951 scopus 로고    scopus 로고
    • Comparing the investment decisions of accounting practitioners and students: An empirical study on the adequacy of student surrogates
    • DOI 10.1016/j.accfor.2004.05.001
    • Liyanarachchi, G. and Milne, M. (2005), "Comparing the investment decisions of accounting practitioners and students: An empirical study on the adequacy of student surrogates", In Accounting Forum, Vol. 29, pp. 121-35. (Pubitemid 40382442)
    • (2005) Accounting Forum , vol.29 , Issue.2 , pp. 121-135
    • Liyanarachchi, G.A.1    Milne, M.J.2
  • 31
    • 33746870727 scopus 로고    scopus 로고
    • The agency of hybrids: Overcoming the symmetrophobic block
    • McMaster, T. and Wastell, D.G. (2005), "The agency of hybrids: Overcoming the symmetrophobic block", Scandinavian Journal of Information Systems, Vol. 17 No. 1, pp. 175-82.
    • (2005) Scandinavian Journal of Information Systems , vol.17 , Issue.1 , pp. 175-82
    • McMaster, T.1    Wastell, D.G.2
  • 33
    • 17344370576 scopus 로고    scopus 로고
    • Personality and domain-specific risk taking
    • DOI 10.1080/1366987032000123856, PII T96297
    • Nicholson, N., Soane, E., Fenton-O'Creevy, M. and Willman, P. (2005), "Personality and domain-specific risk taking", Journal of Risk Research, Vol. 8 No. 2, pp. 157-76. (Pubitemid 43203546)
    • (2005) Journal of Risk Research , vol.8 , Issue.2 , pp. 157-176
    • Nicholson, N.1    Soane, E.2    Fenton-O'Creevy, M.3    Willman, P.4
  • 34
    • 33847382472 scopus 로고    scopus 로고
    • The privacy paradox: Personal information disclosure intentions versus behaviors
    • Norberg, P., Horne, D. and Horne, D. (2007), "The privacy paradox: Personal information disclosure intentions versus behaviors", Journal of Consumer Affairs, Vol. 41 No. 1, pp. 100-26.
    • (2007) Journal of Consumer Affairs , vol.41 , Issue.1 , pp. 100-26
    • Norberg, P.1    Horne, D.2    Horne, D.3
  • 36
    • 38149089032 scopus 로고
    • The relationship between the affective, behavioral, and cognitive components of attitude
    • Ostrom, T.M. (1969), "The relationship between the affective, behavioral, and cognitive components of attitude", Journal of Experimental Social Psychology, Vol. 15 No. 1, pp. 12-30.
    • (1969) Journal of Experimental Social Psychology , vol.15 , Issue.1 , pp. 12-30
    • Ostrom, T.M.1
  • 37
    • 0035542105 scopus 로고    scopus 로고
    • On the use of college students in social science research: Insights from a second-order meta-analysis
    • DOI 10.1086/323732
    • Peterson, R. (2001), "On the use of college students in social science research: Insights from a second-order meta-analysis", Journal of Consumer Research, Vol. 28 No. 3, pp. 450-61. (Pubitemid 33403469)
    • (2001) Journal of Consumer Research , vol.28 , Issue.3 , pp. 450-461
    • Peterson, R.A.1
  • 38
    • 34248334263 scopus 로고    scopus 로고
    • Evaluating information security tradeoffs: Restricting access can interfere with user tasks
    • Post, G.V. and Kagan, A. (2007), "Evaluating information security tradeoffs: Restricting access can interfere with user tasks", Computers and Security, Vol. 26, pp. 253-64.
    • (2007) Computers and Security , vol.26 , pp. 253-64
    • Post, G.V.1    Kagan, A.2
  • 39
    • 0036559882 scopus 로고    scopus 로고
    • Improving computer security for authentication of users: Influence of proactive password restrictions
    • Proctor, R., Lien, M., Schultz, E. and Salvendy, G. (2002), "Improving computer security for authentication of users: Influence of proactive password restrictions", Behavior Research Methods, Instruments, & Computers, Vol. 34 No. 2, pp. 163-9.
    • (2002) Behavior Research Methods, Instruments, & Computers , vol.34 , Issue.2 , pp. 163-9
    • Proctor, R.1    Lien, M.2    Schultz, E.3    Salvendy, G.4
  • 40
    • 0024768109 scopus 로고
    • Passwords in use in a university timesharing environment
    • Riddle, B.L., Miron, M.S. and Semo, J.A. (1989), "Passwords in use in a university timesharing environment", Computers and Security, Vol. 8 No. 7, pp. 569-79.
    • (1989) Computers and Security , vol.8 , Issue.7 , pp. 569-79
    • Riddle, B.L.1    Miron, M.S.2    Semo, J.A.3
  • 42
    • 34347333511 scopus 로고    scopus 로고
    • Research on usability in information security
    • DOI 10.1016/S1361-3723(07)70075-1, PII S1361372307700751
    • Schultz, E.E. (2007), "Research on usability in information security", Computer Fraud & Security, Vol. 6, pp. 8-10. (Pubitemid 47009036)
    • (2007) Computer Fraud and Security , vol.2007 , Issue.6 , pp. 8-10
    • Schultz, E.E.1
  • 43
    • 69749091797 scopus 로고    scopus 로고
    • The role of social cognitive career theory in information technology based academic performance
    • Smith, S. (2002), "The role of social cognitive career theory in information technology based academic performance", Information Technology Learning and Performance Journal, Vol. 20, pp. 1-10.
    • (2002) Information Technology Learning and Performance Journal , vol.20 , pp. 1-10
    • Smith, S.1
  • 46
    • 59249084781 scopus 로고    scopus 로고
    • Survey accesses the state of information security worldwide
    • Swartz, N. (2004), "Survey accesses the state of information security worldwide", Information Management Journal, Vol. 38 No. 1.
    • (2004) Information Management Journal , vol.38 , Issue.1
    • Swartz, N.1
  • 47
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, K.-L. and von Solms, R. (1998), "Information security awareness: Educating our users effectively", Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73. (Pubitemid 128623423)
    • (1998) Information Management and Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 48
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • Venkatesh, V., Morris, M.G., Davis, G.B. and Fred, D. (2003), "User acceptance of information technology: Toward a unified view", MIS Quarterly, Vol. 27 No. 3, pp. 425-78.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-78
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Fred, D.4
  • 49
    • 2642569127 scopus 로고    scopus 로고
    • Introducing the check-off password system (COPS): An advancement in user authentication methods and information security
    • Warkentin, M., Davis, K. and Bekkering, E. (2004), "Introducing the check-off password system (COPS): An advancement in user authentication methods and information security", Journal of Organizational and End User Computing, Vol. 16 No. 3, pp. 41-58.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 41-58
    • Warkentin, M.1    Davis, K.2    Bekkering, E.3
  • 51
    • 0034547827 scopus 로고    scopus 로고
    • Personality and risk-taking: Common bisocial factors
    • Zuckerman, M. and Kuhlman, D. (2000), "Personality and risk-taking: Common bisocial factors", Journal of Personality, Vol. 68 No. 6, pp. 999-1029.
    • (2000) Journal of Personality , vol.68 , Issue.6 , pp. 999-1029
    • Zuckerman, M.1    Kuhlman, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.