메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Which factors explain employees' adherence to information security policies? An empirical study

Author keywords

General deterrence theory; Information security compliance; Protection motivation theory

Indexed keywords

DIRECT PATHS; EMPIRICAL STUDIES; GENERAL DETERRENCE THEORY; INFORMATION SECURITY COMPLIANCE; INFORMATION SECURITY POLICIES; INNOVATION DIFFUSION THEORY; PROTECTION MOTIVATION THEORY; SECURITY POLICY; SELF EFFICACY; THEORY OF REASONED ACTION;

EID: 80053473856     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (47)

References (39)
  • 1
    • 0032339276 scopus 로고    scopus 로고
    • Conceptual and operational definition of personal innovativeness in the domain of information technology
    • Agarwal, R. and J. Prasad. "Conceptual and Operational Definition of Personal Innovativeness in the Domain of Information Technology." Information Systems Research, 1998, 9:2, pp. 204-215.
    • (1998) Information Systems Research , vol.9 , Issue.2 , pp. 204-215
    • Agarwal, R.1    Prasad, J.2
  • 4
    • 2642549662 scopus 로고    scopus 로고
    • Computer and risky computing practices: A rational choice perspective
    • Aytes, K. and Connolly, T. "Computer and Risky Computing Practices: A Rational Choice Perspective", Journal of Organizational and End User Computing, 16:2, 2004, pp. 22-40.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.2 , pp. 22-40
    • Aytes, K.1    Connolly, T.2
  • 5
    • 30744434347 scopus 로고    scopus 로고
    • An analysis of the growth of computer and internet security breaches
    • Bagchi, K. and Udo, G. "An analysis of the growth of computer and Internet security breaches", Communications of AIS 12, 2003, pp. 684-700.
    • (2003) Communications of AIS , vol.12 , pp. 684-700
    • Bagchi, K.1    Udo, G.2
  • 6
    • 0017472917 scopus 로고
    • Self-efficacy: Toward a unifying theory of behaviour change
    • Bandura, A. "Self-Efficacy: Toward a Unifying Theory of Behaviour Change", Psychological Review 84:2, 1977, pp. 191-215.
    • (1977) Psychological Review , vol.84 , Issue.2 , pp. 191-215
    • Bandura, A.1
  • 9
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in information security research: Toward socio-organizational perspectives
    • Dhillon, G. and Backhouse, J. "Current directions in information security research: toward socio-organizational perspectives", Information Systems Journal, 2001, 11:2.
    • (2001) Information Systems Journal , vol.11 , pp. 2
    • Dhillon, G.1    Backhouse, J.2
  • 14
    • 0037411157 scopus 로고    scopus 로고
    • Factors influencing the usage of websites: The case of a generic portal in the Netherlands
    • Heijden, H. V. D. "Factors influencing the usage of websites: the case of a generic portal in The Netherlands." Information & Management, 2003, 40, pp. 541-549.
    • (2003) Information & Management , vol.40 , pp. 541-549
    • Heijden, H.V.D.1
  • 15
    • 0002042413 scopus 로고
    • The 9 to 5 underground: Are you policing computer crimes
    • Hoffer, J. A. and D. W. Straub. "The 9 to 5 Underground: Are you Policing Computer Crimes." Sloan Management Review, 1989, 30:4, pp. 35-43.
    • (1989) Sloan Management Review , vol.30 , Issue.4 , pp. 35-43
    • Hoffer, J.A.1    Straub, D.W.2
  • 16
    • 84883023432 scopus 로고
    • Structural equation model
    • H. R. Hoyle (ed.), SAGE publications, Inc
    • Hoyle, R.H. Structural Equation Model. Concepts, Issues, and Applications, H. R. Hoyle (ed.), SAGE publications, Inc, 1995.
    • (1995) Concepts, Issues, and Applications
    • Hoyle, R.H.1
  • 18
    • 0036299585 scopus 로고    scopus 로고
    • Security surveys spring crop
    • DOI 10.1016/S0167-4048(02)00404-2
    • Hinde, S. "Security surveys spring crop", Computers & Security, 2002, 21:4, pp. 310-321. (Pubitemid 34715235)
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 310-321
    • Hinde, S.1
  • 19
    • 0001094004 scopus 로고    scopus 로고
    • Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs
    • Karahanna, E., Straub, D. W. and Chervany, N. L. "Information technology adoption across time: A cross-sectional comparison of pre-adoption and post-adoption beliefs", MIS Quarterly, 1999, 23:2, pp. 183-213.
    • (1999) MIS Quarterly , vol.23 , Issue.2 , pp. 183-213
    • Karahanna, E.1    Straub, D.W.2    Chervany, N.L.3
  • 20
    • 12444325211 scopus 로고    scopus 로고
    • Force of habit and information systems usage: Theory and initial validation
    • Limayem, M., and Hirt, S.G. "Force of Habit and Information Systems Usage: Theory and Initial Validation", Journal of Association for Information Systems, 2003, 4, pp. 65-97.
    • (2003) Journal of Association for Information Systems , vol.4 , pp. 65-97
    • Limayem, M.1    Hirt, S.G.2
  • 21
    • 0000430606 scopus 로고    scopus 로고
    • Extending the TAM for a World-Wide-Web context
    • DOI 10.1016/S0378-7206(00)00061-6, PII S0378720600000616
    • Moon, J.-W. and Y.-G. Kim. "Extending the TAM for a World-Wide-Web context." Information & Management, 2001, 38, pp. 217-230. (Pubitemid 33651294)
    • (2001) Information and Management , vol.38 , Issue.4 , pp. 217-230
    • Moon, J.-W.1    Kim, Y.-G.2
  • 22
    • 73449149291 scopus 로고
    • Development of an instrument to measure the perceptions of adopting an information technology innovation
    • Moore, G.C. and Benbasat, I. "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation". Information Systems Research, 1991, 2:3, pp. 191-222.
    • (1991) Information Systems Research , vol.2 , Issue.3 , pp. 191-222
    • Moore, G.C.1    Benbasat, I.2
  • 25
    • 0023304222 scopus 로고
    • Effects of components of protection - Motivation theory on adaptive and maladaptive coping with a health threat
    • Rippetoe, S. and Rogers, R. W., "Effects of Components of Protection - Motivation Theory on Adaptive and Maladaptive Coping with a Health Threat", Journal of Personality and Social Psychology, 1987, 52:3, pp. 596-604.
    • (1987) Journal of Personality and Social Psychology , vol.52 , Issue.3 , pp. 596-604
    • Rippetoe, S.1    Rogers, R.W.2
  • 26
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory
    • J. Cacioppo and R. Petty (Eds.), Guilford, New York
    • Rogers, R. W. "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory", in Social Psychophysiology, J. Cacioppo and R. Petty (Eds.), Guilford, New York, 1983.
    • (1983) Social Psychophysiology
    • Rogers, R.W.1
  • 29
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M. "A Conceptual Foundation for Organizational Information Security Awareness", Information Management & Computer Security, 2000, 8:1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 30
    • 24644436394 scopus 로고    scopus 로고
    • Analysis of modern IS security development approaches: Towards the next generation of social and adaptable ISS methods
    • DOI 10.1016/j.infoandorg.2004.11.001, PII S1471772704000557
    • Siponen, M.T. "Analysis of modern information security development approaches: towards the next generation of social and adaptable ISS methods", Information and organization, 2005, 15:4, pp. 339-375. (Pubitemid 41283300)
    • (2005) Information and Organization , vol.15 , Issue.4 , pp. 339-375
    • Siponen, M.T.1
  • 31
    • 36248967046 scopus 로고    scopus 로고
    • Adherence to information security policies: An empirical study
    • Sandton, Gauteng, South Africa
    • Siponen, M. T., Pahnila, S., Mahmood, A. Adherence to Information Security Policies: An Empirical Study. Proceedings of the IFIP SEC2007, Sandton, Gauteng, South Africa, 2007.
    • (2007) Proceedings of the IFIP SEC2007
    • Siponen, M.T.1    Pahnila, S.2    Mahmood, A.3
  • 32
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • Stanton, J. M., Stam, K. R., Mastrangelo, P. and Jolton, J. "An analysis of end user security behaviors", Computers & Security, 2005, 24, pp. 124-133 (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 33
    • 55249123249 scopus 로고
    • Validating instruments in MIS research
    • Straub, D. W. "Validating Instruments in MIS Research", MIS Quarterly, 1989, 13:2, pp. 147-169.
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147-169
    • Straub, D.W.1
  • 34
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D.W. "Effective IS Security: An Empirical Study", Information Systems Research, 1990, 1:3, pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 35
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for. Management decision-making
    • Straub, D.W. and Welke, R.J. "Coping with Systems Risk: Security Planning Models for. Management Decision-Making", MIS Quarterly, 1998, 22:4, pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 37
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • Venkatesh, V., Morris, M. G., Davis, G. B. and Davis, F. D. "User Acceptance of Information Technology: Toward a Unified View", MIS Quarterly, 2003, 27:3, pp. 425-478
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 38
    • 19944367288 scopus 로고    scopus 로고
    • Secure information systems development - A survey and comparison
    • DOI 10.1016/j.cose.2004.09.011, PII S016740480400241X
    • Villarroel, R., Fernández-Medina, E. and Piattini, M. "Secure information systems development - a survey and comparison", Computers & Security, 2005, 24:4, pp. 308-321. (Pubitemid 40752314)
    • (2005) Computers and Security , vol.24 , Issue.4 , pp. 308-321
    • Villarroel, R.1    Fernandez-Medina, E.2    Piattini, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.