메뉴 건너뛰기




Volumn 19, Issue 3, 2011, Pages 140-154

The long-term effects of information security e-learning on organizational learning

Author keywords

Awareness; Behaviour; E learning; Information security; Intervention study; Organizational learning

Indexed keywords

ACTION RESEARCH; AWARENESS; BEHAVIOUR; CONTROL GROUPS; COURSEWARE; DESIGN/METHODOLOGY/APPROACH; E-LEARNING TOOL; HUMAN INTERVENTION; INFORMATION SECURITY AWARENESS; INTERVENTION STUDY; LONG-TERM EFFECTS; ORGANIZATIONAL LEARNING; RESEARCH LIMITATIONS; RESPONSE RATE; SECURITY AWARENESS;

EID: 79960754088     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685221111153537     Document Type: Article
Times cited : (22)

References (24)
  • 1
    • 64749096011 scopus 로고    scopus 로고
    • Friend or foe? Information security management of employees
    • PhD dissertation, Theses No. 2008: 101 Norwegian University of Science and Technology (NTNU) Trondheim
    • Albrechtsen, E. (2008), “Friend or foe? Information security management of employees”, PhD dissertation, Theses No. 2008: 101, Norwegian University of Science and Technology (NTNU), Trondheim.
    • (2008)
    • Albrechtsen, E.1
  • 3
    • 84993023523 scopus 로고
    • Organizational learning and communities-of-practise: toward a unified view of working, learning and innovation
    • Brown, J.S. and Duguid, P. (1991), “Organizational learning and communities-of-practise: toward a unified view of working, learning and innovation”, Organizational Science, Vol. 2 No. 1, pp. 40-57.
    • (1991) Organizational Science , vol.2 , Issue.1 , pp. 40-57
    • Brown, J.S.1    Duguid, P.2
  • 6
    • 42549132969 scopus 로고    scopus 로고
    • The impact of employee participation on the use of an electronic process guide: a longitudinal case study
    • Dings⊘yr, T. and Moe, N.B. (2008), “The impact of employee participation on the use of an electronic process guide: a longitudinal case study”, IEEE Transactions on Software Engineering, Vol. 34 No. 2, pp. 212-226.
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.2 , pp. 212-226
    • Dings⊘yr, T.1    Moe, N.B.2
  • 8
    • 67549103767 scopus 로고    scopus 로고
    • Games, motivation and learning: a research and practice model
    • Garris, R., Ahlers, R. and Driskell, J. (2002), “Games, motivation and learning: a research and practice model”, Simulation and Gaming, Vol. 33 No. 4, pp. 441-7.
    • (2002) Simulation and Gaming , vol.33 , Issue.4 , pp. 441-447
    • Garris, R.1    Ahlers, R.2    Driskell, J.3
  • 9
    • 0028245888 scopus 로고
    • Intervention research in occupational health and safety
    • Goldenhar, L.M. and Schulte, P.A. (1994), “Intervention research in occupational health and safety”, Journal of Occupational Medicine, Vol. 36 No. 7, pp. 763-775.
    • (1994) Journal of Occupational Medicine , vol.36 , Issue.7 , pp. 763-775
    • Goldenhar, L.M.1    Schulte, P.A.2
  • 10
    • 76649089191 scopus 로고    scopus 로고
    • How do employees comply with security policy? A comparative case study of four organizations under the Norwegian Security Act
    • Evaluating the Effectiveness of Organizational Information Security Measures and Employees' Contributions to Security, Doctoral dissertation Faculty of Mathematics and Natural Science, University of Oslo Oslo
    • Hagen, J. (2009 a), “How do employees comply with security policy? A comparative case study of four organizations under the Norwegian Security Act”, The Human Factor Behind the Security Perimenter, Evaluating the Effectiveness of Organizational Information Security Measures and Employees' Contributions to Security, Doctoral dissertation, Faculty of Mathematics and Natural Science, University of Oslo, Oslo.
    • (2009) The Human Factor Behind the Security Perimenter
    • Hagen, J.1
  • 11
    • 70349327744 scopus 로고    scopus 로고
    • Human relationships: a never-ending security education challenge?
    • Hagen, J. (2009 b), “Human relationships: a never-ending security education challenge?”, IEEE Security and Privacy, pp. 72-74.
    • (2009) IEEE Security and Privacy , pp. 72-74
    • Hagen, J.1
  • 12
    • 76649144189 scopus 로고    scopus 로고
    • Effects on employees' information security abilities by e-learning
    • Hagen, J. and Albrechtsen, E. (2009), “Effects on employees' information security abilities by e-learning”, Information Management & Computer Security, Vol. 17 No. 5, pp. 388-407.
    • (2009) Information Management & Computer Security , vol.17 , Issue.5 , pp. 388-407
    • Hagen, J.1    Albrechtsen, E.2
  • 13
    • 79960792360 scopus 로고    scopus 로고
    • A preliminary study of barriers to engagement in cybersiege
    • Technical Report, NPS-CS-09-006 Naval Postgraduate School Monterey, CA
    • Hagen, J., Irvine, C. and Thompson, A. (2009), “A preliminary study of barriers to engagement in cybersiege”, Technical Report, NPS-CS-09-006, Naval Postgraduate School, Monterey, CA.
    • (2009)
    • Hagen, J.1    Irvine, C.2    Thompson, A.3
  • 14
    • 14544293554 scopus 로고    scopus 로고
    • Intervention studies in occupational epidemiology
    • Kristensen, T.S. (2005), “Intervention studies in occupational epidemiology”, Occupational and Environmental Medicine, Vol. 62 No. 3, pp. 205-210.
    • (2005) Occupational and Environmental Medicine , vol.62 , Issue.3 , pp. 205-210
    • Kristensen, T.S.1
  • 16
    • 33750513178 scopus 로고    scopus 로고
    • Motivation to e-learn without organizational settings: an exploratory factor structure
    • Rentroia, M.A., Jorge, J. and Ghauoui, C. (2006), “Motivation to e-learn without organizational settings: an exploratory factor structure”, International Journal Distance Education Technologies, Vol. 4 No. 3, pp. 24-35.
    • (2006) International Journal Distance Education Technologies , vol.4 , Issue.3 , pp. 24-35
    • Rentroia, M.A.1    Jorge, J.2    Ghauoui, C.3
  • 20
    • 24644438691 scopus 로고    scopus 로고
    • The human factor in security
    • Schultz, E. (2005), “The human factor in security”, Computers and Security, Vol. 24 No. 6, pp. 425-6.
    • (2005) Computers and Security , vol.24 , Issue.6 , pp. 425-426
    • Schultz, E.1
  • 21
    • 84993001110 scopus 로고    scopus 로고
    • Building reusable information security courseware
    • paper presented at the Information Security Curriculum Development Conference, Kennesaw, GA, 23-24 September
    • Wang, A.J.A. and Yestko, K. (2005), “Building reusable information security courseware”, paper presented at the Information Security Curriculum Development Conference, Kennesaw, GA, 23-24 September.
    • (2005)
    • Wang, A.J.A.1    Yestko, K.2
  • 22
    • 0036299647 scopus 로고    scopus 로고
    • The development of access control policies for information technology systems
    • Ward, P. and Smith, C.L. (2002), “The development of access control policies for information technology systems”, Computers and Security, Vol. 21 No. 4, pp. 365-371.
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 365-371
    • Ward, P.1    Smith, C.L.2
  • 23
    • 0000539976 scopus 로고
    • The non-traditional quality of organizational learning
    • Weick, K.E. (1991), “The non-traditional quality of organizational learning”, Organizational Science, Vol. 2 No. 1, pp. 116-124.
    • (1991) Organizational Science , vol.2 , Issue.1 , pp. 116-124
    • Weick, K.E.1
  • 24
    • 79960819064 scopus 로고    scopus 로고
    • Leadership and organizational learning
    • Yuiki, G. (2009), “Leadership and organizational learning”, The Leadership Quarterly, Vol. 20 No. 1, pp. 49-53.
    • (2009) The Leadership Quarterly , vol.20 , Issue.1 , pp. 49-53
    • Yuiki, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.