메뉴 건너뛰기




Volumn 30, Issue 6-7, 2011, Pages 397-409

Modeling behavioral considerations related to information security

Author keywords

Computer security; Computer simulation; Experimental data; Information security; Judgment and decision making; Learning; Modeling; System dynamics; Theory integration; Threat detection

Indexed keywords

EXPERIMENTAL DATA; JUDGMENT AND DECISION-MAKING; LEARNING; SYSTEM DYNAMICS; THEORY INTEGRATION; THREAT DETECTION;

EID: 80051804223     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.03.001     Document Type: Article
Times cited : (16)

References (72)
  • 1
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
    • E. Albrechtsen A qualitative study of users' view on information security Computers & Security 26 4 2007 276 289 (Pubitemid 46873753)
    • (2007) Computers and Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 2
    • 67649708310 scopus 로고    scopus 로고
    • The information security digital divide between information security managers and users
    • E. Albrechtsen, and J. Hovden The information security digital divide between information security managers and users Computers & Security 28 6 2009 476 490
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 476-490
    • Albrechtsen, E.1    Hovden, J.2
  • 3
    • 77951204516 scopus 로고    scopus 로고
    • Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
    • E. Albrechtsen, and J. Hovden Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study Computers & Security 29 4 2010 432 445
    • (2010) Computers & Security , vol.29 , Issue.4 , pp. 432-445
    • Albrechtsen, E.1    Hovden, J.2
  • 6
    • 0005096601 scopus 로고
    • Requisite variety and its implications for the control of complex systems
    • W.R. Ashby Requisite variety and its implications for the control of complex systems Cybernetica 1 2 1958 83 99
    • (1958) Cybernetica , vol.1 , Issue.2 , pp. 83-99
    • Ashby, W.R.1
  • 7
    • 0001022016 scopus 로고    scopus 로고
    • Formal aspects of model validity and validation in system dynamics
    • Y. Barlas Formal aspects of model validity and validation in system dynamics System Dynamics Review 12 3 1996 183 210 (Pubitemid 126646439)
    • (1996) System Dynamics Review , vol.12 , Issue.3 , pp. 183-210
    • Barlas, Y.1
  • 10
    • 34249322529 scopus 로고
    • Organismic achievement and environmental probability
    • E. Brunswik Organismic achievement and environmental probability Psychological Review 50 1943 255 272
    • (1943) Psychological Review , vol.50 , pp. 255-272
    • Brunswik, E.1
  • 12
    • 0008761925 scopus 로고
    • The validity of computational models in organization science: From model realism to purpose of the model
    • R.M. Burton, and B. Obel The validity of computational models in organization science: from model realism to purpose of the model Computational & Mathematical Organization Theory 1 1 1995 57 71
    • (1995) Computational & Mathematical Organization Theory , vol.1 , Issue.1 , pp. 57-71
    • Burton, R.M.1    Obel, B.2
  • 13
    • 18644365144 scopus 로고    scopus 로고
    • Experienced-weighted attraction learning in normal games
    • C. Camerer, and T. Ho Experienced-weighted attraction learning in normal games Econometrica 67 4 1999 827 874
    • (1999) Econometrica , vol.67 , Issue.4 , pp. 827-874
    • Camerer, C.1    Ho, T.2
  • 15
    • 74449092722 scopus 로고    scopus 로고
    • A framework and assessment instrument for information security culture
    • A. Da Veiga, and J.H.P. Eloff A framework and assessment instrument for information security culture Computers & Security 29 2 2010 196 207
    • (2010) Computers & Security , vol.29 , Issue.2 , pp. 196-207
    • Da Veiga, A.1    Eloff, J.H.P.2
  • 17
    • 33846794868 scopus 로고    scopus 로고
    • Phishing for user security awareness
    • DOI 10.1016/j.cose.2006.10.009, PII S0167404806001581
    • J.R.C. Dodge, C. Carver, and A.J. Ferguson Phishing for user security awareness Computers & Security 26 1 2007 73 80 (Pubitemid 46216498)
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 73-80
    • Dodge Jr., R.C.1    Carver, C.2    Ferguson, A.J.3
  • 18
    • 33846807812 scopus 로고    scopus 로고
    • Value-focused assessment of ICT security awareness in an academic environment
    • DOI 10.1016/j.cose.2006.10.006, PII S0167404806001544
    • L. Drevin, H.A. Kruger, and T. Steyn Value-focused assessment of ICT security awareness in an academic environment Computers & Security 26 1 2007 36 43 (Pubitemid 46216494)
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 36-43
    • Drevin, L.1    Kruger, H.A.2    Steyn, T.3
  • 19
    • 0032043480 scopus 로고    scopus 로고
    • Signal Detection by Human Observers: A Cutoff Reinforcement Learning Model of Categorization Decisions under Uncertainty
    • I. Erev Signal detection by human observers: A cutoff reinforcement learning model of categorization decisions under uncertainty Psychological Review 105 1998 280 298 (Pubitemid 128457848)
    • (1998) Psychological Review , vol.105 , Issue.2 , pp. 280-298
    • Erev, I.1
  • 20
    • 0000016841 scopus 로고
    • Toward a generalization of signal detection theory to n-person games: The example of two-person safety problem
    • I. Erev, D. Gopher, R. Itkin, and Y. Greenshpan Toward a generalization of signal detection theory to n-person games: the example of two-person safety problem Journal of Mathematical Psychology 39 1995 360 375
    • (1995) Journal of Mathematical Psychology , vol.39 , pp. 360-375
    • Erev, I.1    Gopher, D.2    Itkin, R.3    Greenshpan, Y.4
  • 21
    • 0001283474 scopus 로고    scopus 로고
    • Reinforcement-based vs. belief-based learning models in experimental asymmetric-information games
    • N. Feltovich Reinforcement-based vs. belief-based learning models in experimental asymmetric-information games Econometrica 68 3 2000 605 641
    • (2000) Econometrica , vol.68 , Issue.3 , pp. 605-641
    • Feltovich, N.1
  • 24
    • 34547950128 scopus 로고    scopus 로고
    • Making security usable: Are things improving?
    • DOI 10.1016/j.cose.2007.06.003, PII S0167404807000788
    • S. Furnell Making security usable: are things improving? Computers & Security 26 6 2007 434 443 (Pubitemid 47268096)
    • (2007) Computers and Security , vol.26 , Issue.6 , pp. 434-443
    • Furnell, S.1
  • 27
    • 34547961325 scopus 로고    scopus 로고
    • Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences
    • DOI 10.1016/j.cose.2007.05.003, PII S0167404807000569
    • S.P. Goring, J.R. Rabaiotti, and A.J. Jones Anti-keylogging measures for secure Internet login: an example of the law of unintended consequences Computers & Security 26 6 2007 421 426 (Pubitemid 47268094)
    • (2007) Computers and Security , vol.26 , Issue.6 , pp. 421-426
    • Goring, S.P.1    Rabaiotti, J.R.2    Jones, A.J.3
  • 29
    • 38049148040 scopus 로고    scopus 로고
    • New academic fields as admittance-seeking social movements: The case of strategic management
    • D.C. Hambrick, and M.-J. Chen New academic fields as admittance-seeking social movements: the case of strategic management Academy of Management Review 33 1 2007 32 54
    • (2007) Academy of Management Review , vol.33 , Issue.1 , pp. 32-54
    • Hambrick, D.C.1    Chen, M.-J.2
  • 36
    • 0020056875 scopus 로고
    • The psychology of preferences
    • D. Kahneman, and A. Tversky The psychology of preferences Scientific American 246 1982 160 173 (Pubitemid 12178653)
    • (1982) Scientific American , vol.246 , Issue.1 , pp. 160-173
    • Kahneman, D.1    Tversky, A.2
  • 38
    • 0038466799 scopus 로고
    • Learning from feedback in probabilistic environments
    • J. Klayman Learning from feedback in probabilistic environments Acta Psychologica 56 1984 81 92
    • (1984) Acta Psychologica , vol.56 , pp. 81-92
    • Klayman, J.1
  • 39
    • 0002550796 scopus 로고
    • Cue discovery in probabilistic environments: Uncertainty and experimentation
    • J. Klayman Cue discovery in probabilistic environments: uncertainty and experimentation Learning, Memory, and Cognition 14 2 1988 317 330
    • (1988) Learning, Memory, and Cognition , vol.14 , Issue.2 , pp. 317-330
    • Klayman, J.1
  • 42
    • 70349448077 scopus 로고    scopus 로고
    • Human and organizational factors in computer and information security: Pathways to vulnerabilities
    • S. Kraemer, P. Carayon, and J. Clem Human and organizational factors in computer and information security: pathways to vulnerabilities Computers & Security 28 7 2009 509 520
    • (2009) Computers & Security , vol.28 , Issue.7 , pp. 509-520
    • Kraemer, S.1    Carayon, P.2    Clem, J.3
  • 43
    • 63049132678 scopus 로고    scopus 로고
    • How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
    • D. Liginlal, I. Sim, and L. Khansa How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management Computers & Security 28 3-4 2009 215 228
    • (2009) Computers & Security , vol.28 , Issue.34 , pp. 215-228
    • Liginlal, D.1    Sim, I.2    Khansa, L.3
  • 52
    • 0012317604 scopus 로고    scopus 로고
    • Model calibration as a testing strategy for system dynamics models
    • R. Oliva Model calibration as a testing strategy for system dynamics models European Journal of Operational Research 151 3 2003 552 568
    • (2003) European Journal of Operational Research , vol.151 , Issue.3 , pp. 552-568
    • Oliva, R.1
  • 53
    • 77956393826 scopus 로고    scopus 로고
    • Network anomaly detection through nonlinear analysis
    • F. Palmieri, and U. Fiore Network anomaly detection through nonlinear analysis Computers & Security 29 7 2010 737 755
    • (2010) Computers & Security , vol.29 , Issue.7 , pp. 737-755
    • Palmieri, F.1    Fiore, U.2
  • 58
    • 33846849570 scopus 로고    scopus 로고
    • Organisational security culture: Extending the end-user perspective
    • DOI 10.1016/j.cose.2006.10.008, PII S016740480600157X
    • A.B. Ruighaver, S.B. Maynard, and S. Chang Organisational security culture: extending the end-user perspective Computers & Security 26 1 2007 56 62 (Pubitemid 46216497)
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 56-62
    • Ruighaver, A.B.1    Maynard, S.B.2    Chang, S.3
  • 60
    • 0002039123 scopus 로고
    • Appropriate summary statistics for evaluating the historical fit of system dynamics models
    • Winter
    • J.D. Sterman Appropriate summary statistics for evaluating the historical fit of system dynamics models Dynamica 10 Winter 1984 51 66
    • (1984) Dynamica , vol.10 , pp. 51-66
    • Sterman, J.D.1
  • 62
    • 0002153489 scopus 로고
    • Judgment analysis: Procedures
    • B. Brehmer, C.R.B. Joyce, North-Holland Amsterdam
    • T. Stewart Judgment analysis: procedures B. Brehmer, C.R.B. Joyce, Human judgment: the SJT view 1988 North-Holland Amsterdam
    • (1988) Human Judgment: The SJT View
    • Stewart, T.1
  • 63
    • 0011673029 scopus 로고    scopus 로고
    • Uncertainty, judgment, and error in prediction
    • D. Sarewitz, R.A. Pielke, R. Byerly, 1st ed. Island Press Washington, D.C
    • T.R. Stewart Uncertainty, judgment, and error in prediction D. Sarewitz, R.A. Pielke, R. Byerly, Prediction: science, decision making, and the future of nature 1st ed. 2000 Island Press Washington, D.C. 41 57
    • (2000) Prediction: Science, Decision Making, and the Future of Nature , pp. 41-57
    • Stewart, T.R.1
  • 64
    • 84979353538 scopus 로고
    • Seven components of judgmental forecasting skill: Implications for research and the improvement of forecasts
    • T.R. Stewart, and C.M. Lusk Seven components of judgmental forecasting skill: implications for research and the improvement of forecasts Journal of Forecasting 13 1994 579 599
    • (1994) Journal of Forecasting , vol.13 , pp. 579-599
    • Stewart, T.R.1    Lusk, C.M.2
  • 65
    • 0026841607 scopus 로고
    • The science of choosing the right decision threshold in high-stakes diagnostics
    • J. Swets The science of choosing the right decision threshold in high-stakes diagnostics American Psychologist 47 4 1992 522 532
    • (1992) American Psychologist , vol.47 , Issue.4 , pp. 522-532
    • Swets, J.1
  • 66
    • 0015731803 scopus 로고
    • The relative operating characteristic in psychology
    • J.A. Swets The relative operating characteristic in psychology Science 182 4116 1973 990 1000
    • (1973) Science , vol.182-4116 , pp. 990-1000
    • Swets, J.A.1
  • 68
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • C. Vroom, and R. von Solms Towards information security behavioural compliance Computers & Security 23 3 2004 191 198
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 69
    • 33646514405 scopus 로고    scopus 로고
    • Threshold setting and the cycling of a decision threshold
    • E. Weaver, and G.P. Richardson Threshold setting and the cycling of a decision threshold System Dynamics Review 22 1 2006 1 26
    • (2006) System Dynamics Review , vol.22 , Issue.1 , pp. 1-26
    • Weaver, E.1    Richardson, G.P.2
  • 70
    • 78449304032 scopus 로고    scopus 로고
    • A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives
    • M. Workman A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives Computers & Security 29 8 2010 831 839
    • (2010) Computers & Security , vol.29 , Issue.8 , pp. 831-839
    • Workman, M.1
  • 71
    • 0009316633 scopus 로고    scopus 로고
    • Anxiety and decision making with delayed resolution of uncertainty
    • G. Wu Anxiety and decision making with delayed resolution of uncertainty Theory and Decisions 46 1999 159 198 (Pubitemid 129575797)
    • (1999) Theory and Decision , vol.46 , Issue.2 , pp. 159-198
    • Wu, G.1
  • 72
    • 34547961706 scopus 로고    scopus 로고
    • An adaptive method for anomaly detection in symmetric network traffic
    • DOI 10.1016/j.cose.2007.06.001, PII S0167404807000764
    • M. Yu, and X.-Y. Zhou An adaptive method for anomaly detection in symmetric network traffic Computers & Security 26 6 2007 427 433 (Pubitemid 47268095)
    • (2007) Computers and Security , vol.26 , Issue.6 , pp. 427-433
    • Yu, M.1    Zhou, X.-Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.