메뉴 건너뛰기




Volumn 30, Issue 8, 2011, Pages 803-814

Cybercrime: Understanding and addressing the concerns of stakeholders

Author keywords

Computing; Cybercrime; Information; Malware; Security; Stakeholders

Indexed keywords

COMPUTING; CYBERCRIME; INFORMATION; MALWARE; SECURITY; STAKEHOLDERS;

EID: 80955163816     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.07.003     Document Type: Article
Times cited : (61)

References (115)
  • 2
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
    • E. Albrechtsen A qualitative study of users' view on information security Computers and Security 26 4 2007 276 289 (Pubitemid 46873753)
    • (2007) Computers and Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 4
    • 85044813771 scopus 로고    scopus 로고
    • Enhancing national development and growth through combating cybercrime/Internet fraud: A comparative approach
    • M.O. Asokhia Enhancing national development and growth through combating cybercrime/Internet fraud: a comparative approach Journal of Social Sciences 23 1 2010 13 19
    • (2010) Journal of Social Sciences , vol.23 , Issue.1 , pp. 13-19
    • Asokhia, M.O.1
  • 5
    • 30744434347 scopus 로고    scopus 로고
    • An analysis of the growth of computer and Internet security breaches
    • K. Bagchi, and G. Udo An analysis of the growth of computer and Internet security breaches Communications of AIS 12 2003 684 700
    • (2003) Communications of AIS , vol.12 , pp. 684-700
    • Bagchi, K.1    Udo, G.2
  • 7
    • 84962052143 scopus 로고    scopus 로고
    • Identity theft, social security numbers, and the web
    • H. Bergel Identity theft, social security numbers, and the web Communications of the ACM 43 2 2000 17 21
    • (2000) Communications of the ACM , vol.43 , Issue.2 , pp. 17-21
    • Bergel, H.1
  • 8
    • 33745188425 scopus 로고    scopus 로고
    • State and local law enforcement is not ready for a cyber katrina
    • R. Bhaskar State and local law enforcement is not ready for a cyber katrina Communications of the ACM 49 2 2006 81 83
    • (2006) Communications of the ACM , vol.49 , Issue.2 , pp. 81-83
    • Bhaskar, R.1
  • 10
    • 70249139442 scopus 로고    scopus 로고
    • Cyber-bullying: Developing a policy to direct responses that are equitable and effective in addressing this special form of bullying
    • K. Brown, M. Jackson, and W. Cassidy Cyber-bullying: developing a policy to direct responses that are equitable and effective in addressing this special form of bullying Canadian Journal of Educational Administration and Policy 57 2006 1 35
    • (2006) Canadian Journal of Educational Administration and Policy , vol.57 , pp. 1-35
    • Brown, K.1    Jackson, M.2    Cassidy, W.3
  • 11
    • 4344607488 scopus 로고    scopus 로고
    • Assessing law enforcement preparedness to address Internet fraud
    • DOI 10.1016/j.jcrimjus.2004.06.008, PII S0047235204000662
    • R.G. Burns, K.H. Whitworth, and C.Y. Thompson Assessing law enforcement preparedness to address Internet fraud Journal of Criminal Justice 32 5 2004 477 493 (Pubitemid 39159523)
    • (2004) Journal of Criminal Justice , vol.32 , Issue.5 , pp. 477-493
    • Burns, R.G.1    Whitworth, K.H.2    Thompson, C.Y.3
  • 12
    • 80955133770 scopus 로고    scopus 로고
    • Available from: The Melbourne Age Australia [accessed 05.04.11]
    • S. Butcher Brodie's suicide prompts law on bullying Available from: 2011 The Melbourne Age Australia http://www.theage.com.au/small-business/brodies- suicide-prompts-law-on-bullying-20110405-1czub.html [accessed 05.04.11]
    • (2011) Brodie's Suicide Prompts Law on Bullying
    • Butcher, S.1
  • 16
    • 84924707734 scopus 로고    scopus 로고
    • Cambridge University Press Cambridge, UK
    • J. Clough Principles of cybercrime 2010 Cambridge University Press Cambridge, UK
    • (2010) Principles of Cybercrime
    • Clough, J.1
  • 17
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • F. Cohen Computer viruses: theory and experiments Computers and Security 6 1 1987 22 35
    • (1987) Computers and Security , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 18
    • 33750215146 scopus 로고
    • Commonwealth of Australia
    • Commonwealth of Australia Criminal Code Act 1995
    • (1995) Criminal Code Act
  • 19
    • 80955133771 scopus 로고    scopus 로고
    • Commonwealth of Australia
    • Commonwealth of Australia Cybercrime Act 2001
    • (2001) Cybercrime Act
  • 21
    • 80955133774 scopus 로고    scopus 로고
    • Commonwealth of Australia Available from: [accessed 01.06.11]
    • Commonwealth of Australia Inquiry into cyber-safety, joint select committee on cyber-safety Available from: 2010 http://www.aph.gov.au/house/ committee/jscc/index.htm [accessed 01.06.11]
    • (2010) Inquiry into Cyber-safety, Joint Select Committee on Cyber-safety
  • 23
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute (CSI) 5th ed. CSI New York, NY
    • Computer Security Institute (CSI) CSI/FBI computer crime and security survey 5th ed. 2000 CSI New York, NY
    • (2000) CSI/FBI Computer Crime and Security Survey
  • 24
    • 3242808612 scopus 로고    scopus 로고
    • Computer Security Institute (CSI) 14th ed. CSI New York, NY
    • Computer Security Institute (CSI) CSI/FBI computer crime and security survey 14th ed. 2009 CSI New York, NY
    • (2009) CSI/FBI Computer Crime and Security Survey
  • 25
    • 80955156122 scopus 로고    scopus 로고
    • Council of Europe Available from: [accessed 08.08.10]
    • Council of Europe Convention on cybercrime Available from: 2004 http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=185&CM= 8&DF=09/11/2010&CL=ENG [accessed 08.08.10]
    • (2004) Convention on Cybercrime
  • 27
    • 77956750862 scopus 로고    scopus 로고
    • Available from: Child Health Promotion Research Centre, Edith Cowan University Perth [accessed 18.05.10]
    • D. Cross, T. Shaw, L. Hearn, M. Epstein, H. Monks, and L. Lester Australian covert bullying prevalence study (ACBPS) Available from: 2009 Child Health Promotion Research Centre, Edith Cowan University Perth http://www.deewr.gov.au/schooling/nationalsafeschools/pages/research.aspx [accessed 18.05.10]
    • (2009) Australian Covert Bullying Prevalence Study (ACBPS)
    • Cross, D.1    Shaw, T.2    Hearn, L.3    Epstein, M.4    Monks, H.5    Lester, L.6
  • 28
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • DOI 10.1109/MPRV.2004.21
    • D. Dagon, T. Martin, and T. Starner Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Computing 3 4 2004 11 15 (Pubitemid 40010893)
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 29
    • 0037784738 scopus 로고
    • Construct validity in measurement: A pattern matching approach
    • J. Davis Construct validity in measurement: a pattern matching approach Evaluation and Program Planning 12 1 1989 31 36
    • (1989) Evaluation and Program Planning , vol.12 , Issue.1 , pp. 31-36
    • Davis, J.1
  • 31
    • 21844463321 scopus 로고
    • The stakeholder theory of the corporation: Concepts, evidence and implications
    • T. Donaldson, and L.E. Preston The stakeholder theory of the corporation: concepts, evidence and implications Academy of Management Review 20 1995 65 91
    • (1995) Academy of Management Review , vol.20 , pp. 65-91
    • Donaldson, T.1    Preston, L.E.2
  • 33
    • 3142712929 scopus 로고    scopus 로고
    • Stakeholder theory and "the corporate objective revisited"
    • R.E. Freeman, A.C. Wicks, and B. Parmar Stakeholder theory and "the corporate objective revisited" Organization Science 15 2004 364 369
    • (2004) Organization Science , vol.15 , pp. 364-369
    • Freeman, R.E.1    Wicks, A.C.2    Parmar, B.3
  • 34
    • 35248861486 scopus 로고    scopus 로고
    • Categorising cybercrime and cybercriminals: The problem and potential approaches
    • S.M. Furnell Categorising cybercrime and cybercriminals: the problem and potential approaches Journal of Information Warfare 1 2 2001 35 44
    • (2001) Journal of Information Warfare , vol.1 , Issue.2 , pp. 35-44
    • Furnell, S.M.1
  • 37
    • 17844404852 scopus 로고    scopus 로고
    • Malicious bots threaten network security
    • D. Geer Malicious bots threaten network security Computer 38 2005 18 20 (Pubitemid 40583538)
    • (2005) Computer , vol.38 , Issue.1 , pp. 18-20
    • Geer, D.1
  • 38
    • 23344439017 scopus 로고    scopus 로고
    • Spyware was inevitable
    • DOI 10.1145/1076211.1076236
    • S. Gibson Spyware was inevitable Communications of the ACM 48 8 2005 37 39 (Pubitemid 41101411)
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 37-39
    • Gibson, S.1
  • 41
    • 34247605968 scopus 로고    scopus 로고
    • When web browsers turn bad
    • J. Hecht When web browsers turn bad New Scientist 194 2602 2007 60
    • (2007) New Scientist , vol.194 , Issue.2602 , pp. 60
    • Hecht, J.1
  • 42
    • 34249008392 scopus 로고    scopus 로고
    • New attack tricks antivirus software
    • K. Heyman New attack tricks antivirus software Computer 40 5 2007 18 21
    • (2007) Computer , vol.40 , Issue.5 , pp. 18-21
    • Heyman, K.1
  • 44
    • 77957082458 scopus 로고    scopus 로고
    • Trends in cybercrime: The darkside of the Internet
    • S.B. Hoar Trends in cybercrime: the darkside of the Internet Criminal Justice 20 3 2005 4 13
    • (2005) Criminal Justice , vol.20 , Issue.3 , pp. 4-13
    • Hoar, S.B.1
  • 45
    • 0036388121 scopus 로고    scopus 로고
    • Concept mapping as an alternative approach for the analysis of open-ended survey responses
    • K. Jackson, and W.K.M. Trochim Concept mapping as an alternative approach for the analysis of open-ended survey responses Organizational Research Methods 5 4 2002 307 336
    • (2002) Organizational Research Methods , vol.5 , Issue.4 , pp. 307-336
    • Jackson, K.1    Trochim, W.K.M.2
  • 51
    • 33644755338 scopus 로고    scopus 로고
    • Security awareness: Switch to a better programme
    • DOI 10.1016/S1353-4858(06)70337-3, PII S1353485806703373
    • E. Johnson Security awareness: switch to a better programme Network Security Feb 2006 15 18 (Pubitemid 43343971)
    • (2006) Network Security , vol.2006 , Issue.2 , pp. 15-18
    • Johnson, E.C.1
  • 52
    • 80955156118 scopus 로고    scopus 로고
    • Available from: Daily Telegraph Australia [accessed 21.03.11]
    • N. Klein Casey heynes breaks silence over bully video from chifley college and thoughts of suicide Available from: 2011 Daily Telegraph Australia http://www.dailytelegraph.com.au/news/casey-heynes-breaks-silence-over-bully- video-from-chifley-college-and-thoughts-of-suicide/story-e6freuy9-1226024997247 [accessed 21.03.11]
    • (2011) Casey Heynes Breaks Silence over Bully Video from Chifley College and Thoughts of Suicide
    • Klein, N.1
  • 56
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • B. Lampson Computer security in the real world IEEE Computer 37 6 2004 37 46
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 37-46
    • Lampson, B.1
  • 57
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • N. Leavitt Mobile phones: the next frontier for hackers? IEEE Computer 38 4 2005 20 23 (Pubitemid 40608419)
    • (2005) Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 58
    • 80955126551 scopus 로고    scopus 로고
    • Leximancer Leximancer Brisbane, Australia
    • Leximancer Leximancer user manual version 2.25 2005 Leximancer Brisbane, Australia
    • (2005) Leximancer User Manual Version 2.25
  • 59
    • 77956877221 scopus 로고    scopus 로고
    • Cybercrime & cybercriminals: An overview of the Taiwan experience
    • C. Lu, W. Jen, W. Chang, and S. Chou Cybercrime & cybercriminals: an overview of the Taiwan experience Journal of Computers 1 6 2006 11 18
    • (2006) Journal of Computers , vol.1 , Issue.6 , pp. 11-18
    • Lu, C.1    Jen, W.2    Chang, W.3    Chou, S.4
  • 62
    • 74549178599 scopus 로고    scopus 로고
    • Profiling enterprise risks in large computer companies using the Leximancer software tool
    • N.J. Martin, and J.L. Rice Profiling enterprise risks in large computer companies using the Leximancer software tool Risk Management: International Journal 9 3 2007 188 206
    • (2007) Risk Management: International Journal , vol.9 , Issue.3 , pp. 188-206
    • Martin, N.J.1    Rice, J.L.2
  • 63
    • 84979837868 scopus 로고    scopus 로고
    • Identity theft in an online world
    • DOI 10.1016/j.clsr.2005.02.004, PII S0267364905000683
    • A.M. Marshall, and B.C. Tompsett Identity theft in an online world Computer Law and Security Report 21 2 2005 128 137 (Pubitemid 40480163)
    • (2005) Computer Law and Security Report , vol.21 , Issue.2 , pp. 128-137
    • Marshall, A.M.1    Tompsett, B.C.2
  • 64
  • 65
    • 23944454354 scopus 로고    scopus 로고
    • Automated identity theft
    • DOI 10.1109/MSECP.2003.1236244
    • B. McCarty Automated identity theft IEEE Security and Privacy 1 5 2003 89 92 (Pubitemid 41270176)
    • (2003) IEEE Security and Privacy , vol.1 , Issue.5 , pp. 89-92
    • McCarty, B.1
  • 66
    • 0034269416 scopus 로고    scopus 로고
    • Attacking malicious code: A report to the Infosec research council
    • G. McGraw, and G. Morrisett Attacking malicious code: a report to the Infosec research council IEEE Software 17 5 2000 33 41
    • (2000) IEEE Software , vol.17 , Issue.5 , pp. 33-41
    • McGraw, G.1    Morrisett, G.2
  • 68
    • 33745893541 scopus 로고    scopus 로고
    • Scoping identity theft
    • Two Decades of the Language-action Perspective
    • R. Mercuri Scoping identity theft Communications of the ACM 49 2 2006 17 21 (Pubitemid 44046397)
    • (2006) Communications of the ACM , vol.49 , Issue.5 , pp. 17-21
    • Mercuri, R.T.1
  • 72
    • 80855141387 scopus 로고    scopus 로고
    • The managers guide to understanding, detecting and thwarting computer crime: An international performance issue
    • N. Nykodym, L. Kahle-Piasecki, and E. Marsillac The managers guide to understanding, detecting and thwarting computer crime: an international performance issue Performance Improvement Journal 49 5 2010 42 47
    • (2010) Performance Improvement Journal , vol.49 , Issue.5 , pp. 42-47
    • Nykodym, N.1    Kahle-Piasecki, L.2    Marsillac, E.3
  • 74
    • 84979835616 scopus 로고    scopus 로고
    • Criminal profiling and insider cyber crime
    • DOI 10.1016/j.clsr.2005.07.001, PII S0267364905001433
    • N. Nykodym, R. Taylor, and J. Vilela Criminal profiling and insider cyber crime CLSR Computer Law and Security Report 21 2005 408 414 (Pubitemid 41313062)
    • (2005) Computer Law and Security Report , vol.21 , Issue.5 , pp. 408-414
    • Nykodym, N.1    Taylor, R.2    Vilela, J.3
  • 77
    • 0034818913 scopus 로고    scopus 로고
    • Trends in cybercrime - an overview of current financial crimes on the Internet
    • DOI 10.1016/S0167-4048(01)01021-5
    • S. Philippsohn Trends in cybercrime: an overview of current financial crimes on the Internet Computers and Security 20 2001 53 69 (Pubitemid 32874121)
    • (2001) Computers and Security , vol.20 , Issue.1 , pp. 53-69
    • Philippsohn, S.1
  • 78
    • 0034960975 scopus 로고    scopus 로고
    • Cyber crime: The backdrop to the Council of Europe Convention
    • DOI 10.1016/S0167-4048(01)00406-0
    • C. Pounder Cybercrime: backdrop to the Council of Europe convention Computers and Security 20 2001 311 315 (Pubitemid 32585904)
    • (2001) Computers and Security , vol.20 , Issue.4 , pp. 311-315
    • Pounder, C.1
  • 80
    • 34547399387 scopus 로고    scopus 로고
    • A multifaceted approach to understanding the botnet phenomenon
    • DOI 10.1145/1177080.1177086, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
    • Rajab MA, Zarfoss J, Monrose F, Terzis A. A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, October 25-27, Rio de Janeiro, Brazil 2006; pp. 41-52. (Pubitemid 47165587)
    • (2006) Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC , pp. 41-52
    • Abu Rajab, M.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 82
    • 0012828167 scopus 로고    scopus 로고
    • Cybercrimes of the 21st century
    • A. Riem Cybercrimes of the 21st century Computer Fraud and Security 3 2001 13 15
    • (2001) Computer Fraud and Security , vol.3 , pp. 13-15
    • Riem, A.1
  • 83
    • 0012828167 scopus 로고    scopus 로고
    • Cybercrimes of the 21st century
    • A. Riem Cybercrimes of the 21st century Computer Fraud and Security 4 2001 12 15
    • (2001) Computer Fraud and Security , vol.4 , pp. 12-15
    • Riem, A.1
  • 84
    • 0012828167 scopus 로고    scopus 로고
    • Cybercrimes of the 21st century: Crimes against the individual - Part 1
    • A. Riem Cybercrimes of the 21st century: crimes against the individual - part 1 Computer Fraud and Security 6 2001 13 17
    • (2001) Computer Fraud and Security , vol.6 , pp. 13-17
    • Riem, A.1
  • 88
    • 1242263792 scopus 로고    scopus 로고
    • Security training and awareness - Fitting a square peg in a round hole
    • E. Schultz Security training and awareness - fitting a square peg in a round hole Computers and Security 26 1 2004 1 2
    • (2004) Computers and Security , vol.26 , Issue.1 , pp. 1-2
    • Schultz, E.1
  • 89
    • 24644438691 scopus 로고    scopus 로고
    • The human factor in security
    • DOI 10.1016/j.cose.2005.07.002, PII S0167404805001045
    • E. Schultz The human factor in security Computers and Security 24 6 2005 425 426 (Pubitemid 41277028)
    • (2005) Computers and Security , vol.24 , Issue.6 , pp. 425-426
    • Schultz, E.1
  • 91
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • M.T. Siponen A conceptual foundation for organizational information security awareness Information Management and Computer Security 8 1 2000 31 41
    • (2000) Information Management and Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 92
    • 53049103906 scopus 로고    scopus 로고
    • Five dimensions of information security awareness
    • M.T. Siponen Five dimensions of information security awareness Computers and Society 31 2 2001 24 29
    • (2001) Computers and Society , vol.31 , Issue.2 , pp. 24-29
    • Siponen, M.T.1
  • 94
    • 0036036094 scopus 로고    scopus 로고
    • Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
    • DOI 10.1108/09685220210436976
    • A.D. Smith, and W.T. Rupp Issues in cybersecurity: understanding the potential risks associated with hackers/crackers Information Management and Computer Security 10 4 2002 178 183 (Pubitemid 35010223)
    • (2002) Information Management and Computer Security , vol.10 , Issue.4 , pp. 178-183
    • Smith, A.D.1    Rupp, W.T.2
  • 95
    • 33748991451 scopus 로고    scopus 로고
    • Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping
    • A.E. Smith, and M.S. Humphreys Evaluation of unsupervised semantic mapping of natural language with Leximancer concept mapping Behaviour Research Methods 38 2 2006 262 279
    • (2006) Behaviour Research Methods , vol.38 , Issue.2 , pp. 262-279
    • Smith, A.E.1    Humphreys, M.S.2
  • 98
    • 1642566053 scopus 로고    scopus 로고
    • The future for the policing of cybercrime
    • DOI 10.1016/S1361-3723(04)00017-X, PII S136137230400017X
    • P. Sommer The future for the policing of cybercrime Computer Fraud and Security 1 2004 8 12 (Pubitemid 38128121)
    • (2004) Computer Fraud and Security , vol.2004 , Issue.1 , pp. 8-12
    • Sommer, P.1
  • 99
    • 0012068216 scopus 로고
    • Computer viruses as artificial life
    • E.H. Spafford Computer viruses as artificial life Journal of Artificial Life 1 3 1994 249 265
    • (1994) Journal of Artificial Life , vol.1 , Issue.3 , pp. 249-265
    • Spafford, E.H.1
  • 100
    • 77956790843 scopus 로고    scopus 로고
    • Available from: Hawke Research Institute for Sustainable Societies, University of South Australia [accessed 23.12.09]
    • B. Spears, P. Slee, L. Owens, and B. Johnson Behind the scenes: insights into the human dimension of covert bullying Available from: 2008 Hawke Research Institute for Sustainable Societies, University of South Australia http://www.deewr.gov.au/schooling/nationalsafeschools/pages/research.aspx [accessed 23.12.09]
    • (2008) Behind the Scenes: Insights into the Human Dimension of Covert Bullying
    • Spears, B.1    Slee, P.2    Owens, L.3    Johnson, B.4
  • 101
    • 0034288049 scopus 로고    scopus 로고
    • Redefining borders: The challenges of cybercrime
    • D.L. Speer Redefining borders: the challenges of cybercrime Crime, Law and Social Change 34 3 2000 259 273
    • (2000) Crime, Law and Social Change , vol.34 , Issue.3 , pp. 259-273
    • Speer, D.L.1
  • 103
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • J.M. Stanton, K.R. Stam, P. Mastrangelo, and J. Jolton Analysis of end user security behaviours Computers and Security 24 2 2005 124 133 (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 106
    • 23344447680 scopus 로고    scopus 로고
    • Why Spyware poses multiple threats to security
    • DOI 10.1145/1076211.1076237
    • R. Thompson Why spyware poses multiple threats to security Communications of the ACM 48 8 2005 41 43 (Pubitemid 41101412)
    • (2005) Communications of the ACM , vol.48 , Issue.8 , pp. 41-43
    • Thompson, R.1
  • 108
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • M.E. Thomson, and R. von Solms Information security awareness: educating your users effectively Information Management and Computer Security 6 4 1998 167 173 (Pubitemid 128623423)
    • (1998) Information Management and Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 109
    • 34248627452 scopus 로고
    • An introduction to concept mapping for planning and evaluation
    • W.K.M. Trochim An introduction to concept mapping for planning and evaluation Evaluation and Program Planning 12 1 1989 1 16
    • (1989) Evaluation and Program Planning , vol.12 , Issue.1 , pp. 1-16
    • Trochim, W.K.M.1
  • 110
    • 0027938361 scopus 로고
    • Using concept mapping to develop a conceptual framework of staff's views of a supported employment program for individuals with severe mental illness
    • DOI 10.1037//0022-006X.62.4.766
    • W.K.M. Trochim, J. Cook, and R. Setze Using concept mapping to develop a conceptual framework of staff's views of a supported employment program for persons with severe mental illness Consulting and Clinical Psychology 62 4 1994 766 775 (Pubitemid 24268719)
    • (1994) Journal of Consulting and Clinical Psychology , vol.62 , Issue.4 , pp. 766-775
    • Trochim, W.M.K.1    Cook, J.A.2    Setze, R.J.3
  • 111
    • 1442330920 scopus 로고    scopus 로고
    • Setting objectives for community and systems change: An application of concept mapping for planning a statewide health improvement initiative
    • W.K.M. Trochim, B. Milstein, B. Wood, S. Jackson, and V. Pressler Setting objectives for community and systems change: an application of concept mapping for planning a statewide health improvement initiative Health Promotion Practice 5 1 2004 8 19
    • (2004) Health Promotion Practice , vol.5 , Issue.1 , pp. 8-19
    • Trochim, W.K.M.1    Milstein, B.2    Wood, B.3    Jackson, S.4    Pressler, V.5
  • 112
    • 68849083729 scopus 로고    scopus 로고
    • Prentice Hall Upper Saddle River, NJ
    • J.R. Vacca Identity theft 2003 Prentice Hall Upper Saddle River, NJ
    • (2003) Identity Theft
    • Vacca, J.R.1
  • 113
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • M.E. Whitman Enemy at the gate: threats to information security Communications of the ACM 46 8 2003 91 95
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.