메뉴 건너뛰기




Volumn 1, Issue 1, 2010, Pages

Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures

Author keywords

Dynamic regression; Information search behavior; Information security; Information systems; Network attacks; Search engine; Vulnerability disclosures

Indexed keywords

DATA SETS; DYNAMIC REGRESSION MODELS; INFORMATION SEARCH; INFORMATION SEARCH BEHAVIOR; NETWORK ATTACK; SEARCH BEHAVIOR; VULNERABILITY DISCLOSURE;

EID: 82255171897     PISSN: 2158656X     EISSN: 21586578     Source Type: Journal    
DOI: 10.1145/1877725.1877728     Document Type: Article
Times cited : (15)

References (64)
  • 2
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimethod empirical examination of home computer user security behavioral Intentions
    • ANDERSON, C. L. AND AGARWAL, R. 2010. Practicing safe computing: A multimethod empirical examination of home computer user security behavioral Intentions. MIS Quart. 34, 3, 613-643.
    • (2010) MIS Quart. , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 3
    • 0000218526 scopus 로고
    • Rejection of outliers
    • ANSCOMBE, F. J. 1960. Rejection of outliers. Technomet. 2, 2, 123-147.
    • (1960) Technomet. , vol.2 , Issue.2 , pp. 123-147
    • Anscombe, F.J.1
  • 4
    • 0345327807 scopus 로고    scopus 로고
    • Internet anonymity practices in computer crime
    • ARMSTRONG, H. L. AND FORDE, P. J. 2003. Internet anonymity practices in computer crime. Inform. Manag. Comput. Secur. 11, 5, 209-215.
    • (2003) Inform. Manag. Comput. Secur. , vol.11 , Issue.5 , pp. 209-215
    • Armstrong, H.L.1    Forde, P.J.2
  • 5
    • 77954250852 scopus 로고    scopus 로고
    • An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure
    • ARORA, A.,KRISHNAN, R.,TELANG, R., AND YANG, Y. 2010. An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure. Inf. Syst. Res. 21, 1, 115-132.
    • (2010) Inf. Syst. Res. , vol.21 , Issue.1 , pp. 115-132
    • Arora, A.1    Krishnan, R.2    Telang, R.3    Yang, Y.4
  • 6
    • 33846183559 scopus 로고    scopus 로고
    • Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
    • DOI 10.1007/s10796-006-9012-5, Economic aspects of Information Security
    • ARORA, A., NANDKUMAR, A., AND TELANG, R. 2006. Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Inf. Syst. Frontiers 8, 5, 350-362. (Pubitemid 46088509)
    • (2006) Information Systems Frontiers , vol.8 , Issue.5 , pp. 350-362
    • Arora, A.1    Nandkumar, A.2    Telang, R.3
  • 7
    • 0000399057 scopus 로고    scopus 로고
    • Decision quality using ranked attribute weights
    • BARRON, F. H. AND BARRETT, B. E. 1996. Decision quality using ranked attribute weights. Manag. Sci. 42, 11, 1515-1523. (Pubitemid 126590218)
    • (1996) Management Science , vol.42 , Issue.11 , pp. 1515-1523
    • Barron, F.H.1    Barrett, B.E.2
  • 8
    • 35448998999 scopus 로고    scopus 로고
    • Penguin Books, New York
    • BATTELLE, J. 2005. The Search. Penguin Books, New York.
    • (2005) The Search
    • Battelle, J.1
  • 10
    • 21144464269 scopus 로고
    • Uncertainty orientation and protection motivation theory: The role of individual differences in health compliance
    • BROUWERS, M. C. AND SORRENTINO, R. M. 1993. Uncertainty orientation and protection motivation theory: The role of individual differences in health compliance. J. Person. Social Psych. 65, 1, 102-112.
    • (1993) J. Person. Social Psych. , vol.65 , Issue.1 , pp. 102-112
    • Brouwers, M.C.1    Sorrentino, R.M.2
  • 11
    • 36749092418 scopus 로고
    • Using daily stock returns the case of event studies
    • BROWN, S. J. ANDWARNER, J. B. 1985. Using daily stock returns the case of event studies. J. Finan. Econ. 14, 3-31.
    • (1985) J. Finan. Econ. , vol.14 , pp. 3-31
    • Brown, S.J.1    Warner, J.B.2
  • 14
    • 33947376004 scopus 로고    scopus 로고
    • Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge
    • DOI 10.1109/TSE.2007.26
    • CAVUSOGLU, H., CAVUSOGLU, H., AND RAGHUNATHAN, S. 2007. Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Trans. Softw. Engin. 33, 3, 171-185. (Pubitemid 46443998)
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.3 , pp. 171-185
    • Cavusoglu, H.1    Cavusoglu, H.2    Raghunathan, S.3
  • 16
    • 33947710830 scopus 로고    scopus 로고
    • What are people searching on government web sites?
    • DOI 10.1145/1232743.1232753
    • CHAU, M.,FANG, X., AND SHENG, O.R.L. 2007. What are people searching on government web sites? Comm. ACM 50, 4, 87-92 (Pubitemid 46494533)
    • (2007) Communications of the ACM , vol.50 , Issue.4 , pp. 87-92
    • Chau, M.1    Fang, X.2    Liu Sheng, O.R.3
  • 17
    • 33645225914 scopus 로고    scopus 로고
    • From cues to action: Information seeking and exercise self-care among older adults managing chronic illness
    • CHOU, P. H. B. AND WISTER, A. V. 2005. From cues to action: Information seeking and exercise self-care among older adults managing chronic illness. Canad. J. Aging 24, 4, 395-408.
    • (2005) Canad. J. Aging , vol.24 , Issue.4 , pp. 395-408
    • Chou, P.H.B.1    Wister, A.V.2
  • 20
    • 85036258669 scopus 로고
    • Distribution of the estimators for autoregressive time series with a unit root
    • DICKEY, D. AND FULLER, W. 1979. Distribution of the estimators for autoregressive time series with a unit root. J. Amer. Statist. Assoc. 74, 427-431.
    • (1979) J. Amer. Statist. Assoc. , vol.74 , pp. 427-431
    • Dickey, D.1    Fuller, W.2
  • 21
    • 0000472488 scopus 로고
    • Likelihood ratio tests for autoregressive time series with a unit root
    • DICKEY, D. AND FULLER, W. 1981. Likelihood ratio tests for autoregressive time series with a unit root. Econometr. 49, 4, 1057-1072.
    • (1981) Econometr. , vol.49 , Issue.4 , pp. 1057-1072
    • Dickey, D.1    Fuller, W.2
  • 22
    • 0033339151 scopus 로고    scopus 로고
    • Computer crime and abuse: A survey of public attitudes and awareness
    • DOWLAND, P. S., FURNELLL, S. M., ILLINGWORTH, H. M., AND REYNOLDS, P. L. 1999. Computer crime and abuse: A survey of public attitudes and awareness. Comput. Secur. 18, 8, 715-729.
    • (1999) Comput. Secur. , vol.18 , Issue.8 , pp. 715-729
    • Dowland, P.S.1    Furnelll, S.M.2    Illingworth, H.M.3    Reynolds, P.L.4
  • 23
    • 0001331172 scopus 로고
    • Knowledge and the ordered protection motivation model: Tools for preventing AIDS
    • EPPRIGHT, D. R., JOHN F. TANNER, J., AND HUNT, J. B. 1994. Knowledge and the ordered protection motivation model: Tools for preventing AIDS. J. Bus. Res. 30, 1, 13-24.
    • (1994) J. Bus. Res. , vol.30 , Issue.1 , pp. 13-24
    • Eppright, D.R.1    John, F.2    Tanner, J.3    Hunt, J.B.4
  • 24
    • 33745211430 scopus 로고    scopus 로고
    • Using web-based search data to predict macroeconomic statistics
    • DOI 10.1145/1096000.1096010
    • ETTREDGE, M., GERDES, J., AND KARUGA, G. 2005. Using web-based search data to predict macroeconomic statistics. Comm. ACM 48, 11, 87-92 (Pubitemid 43906448)
    • (2005) Communications of the ACM , vol.48 , Issue.11 , pp. 87-92
    • Ettredge, M.1    Gerdes, J.2    Karuga, G.3
  • 25
    • 0034397237 scopus 로고    scopus 로고
    • A meta-analysis of research on protection motivation theory
    • FLOYD, D. L., PRENTICE-DUNN, S., AND ROGERS, R. W. 2000. A meta-analysis of research on protection motivation theory. J. Appl. Soc. Psych. 30, 2, 407-429.
    • (2000) J. Appl. Soc. Psych. , vol.30 , Issue.2 , pp. 407-429
    • Floyd, D.L.1    Prentice-Dunn, S.2    Rogers, R.W.3
  • 26
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: A survey of end-users
    • DOI 10.1016/j.cose.2005.12.004, PII S0167404805002038
    • FURNELL, S. M., JUSOH, A., AND KATSABAS, D. 2006. The challenges of understanding and using security: A survey of end-users. Comput. Secur. 25, 1, 27-35. (Pubitemid 43227229)
    • (2006) Computers and Security , vol.25 , Issue.1 , pp. 27-35
    • Furnell, S.M.1    Jusoh, A.2    Katsabas, D.3
  • 28
    • 0033043069 scopus 로고    scopus 로고
    • Proposed model of the relationship of risk information seeking and processing to the development of preventive behaviors
    • DOI 10.1006/enrs.1998.3940
    • GRIFFIN, R. J., DUNWOODY, S., AND NEUWIRTH, K. 1999. Proposed model of the relationship of risk information seeking and processing to the development of preventive behaviors. Environ. Res. 80, 2, S230-S245. (Pubitemid 29143250)
    • (1999) Environmental Research , vol.80 , Issue.2
    • Griffin, R.J.1    Dunwoody, S.2    Neuwirth, K.3
  • 29
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • HERATH, T. AND RAO, H. R. 2009a. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47, 2, 154-165.
    • (2009) Decis. Support Syst. , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 30
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • HERATH, T. AND RAO,H. R. 2009b. Protection motivation and deterrence: A framework for security policy compliance in organisations. Euro. J. Inf. Syst. 18, 2, 106-125.
    • (2009) Euro. J. Inf. Syst. , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 32
    • 34248599033 scopus 로고    scopus 로고
    • The comparative effectiveness of sponsored and nonsponsored links for web E-commerce queries
    • JANSEN, B. J. 2007. The comparative effectiveness of sponsored and nonsponsored links for web E-commerce queries. ACM Trans. Web 1, 1, 3-es.
    • (2007) ACM Trans. Web , vol.1 , Issue.1
    • Jansen, B.J.1
  • 33
    • 84860590808 scopus 로고    scopus 로고
    • Counterstrike
    • J.M. Balkin, K. Eddan, J. Grimmelmann, N. Kozlovski, S. Wagman and T. Zarsky, Eds. NYU Press, New York
    • KARNOW, C. E. A. 2007. Counterstrike. In Cybercrime: Digital Cops in A Networked Environment, J.M. Balkin, K. Eddan, J. Grimmelmann, N. Kozlovski, S. Wagman and T. Zarsky, Eds. NYU Press, New York.
    • (2007) Cybercrime: Digital Cops in A Networked Environment
    • Karnow, C.E.A.1
  • 35
    • 56049103535 scopus 로고    scopus 로고
    • Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls
    • KUMAR, N., MOHAN, K., AND HOLOWCZAK, R. 2008. Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls. Decis. Support Syst. 46, 1, 254-264.
    • (2008) Decis. Support Syst. , vol.46 , Issue.1 , pp. 254-264
    • Kumar, N.1    Mohan, K.2    Holowczak, R.3
  • 36
    • 35548965096 scopus 로고    scopus 로고
    • An examination of private intermediaries' roles in software vulnerabilities disclosure
    • DOI 10.1007/s10796-007-9047-2
    • LI, P. AND RAO, H. R. 2007. An examination of private intermediaries' roles in software vulnerabilities disclosure. Inf. Syst. Frontiers 9, 5, 531-539. (Pubitemid 350007347)
    • (2007) Information Systems Frontiers , vol.9 , Issue.5 , pp. 531-539
    • Li, P.1    Rao, H.R.2
  • 37
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: A theoretical perspective
    • LIANG, H., AND XUE, Y. 2009. Avoidance of information technology threats: A theoretical perspective. MIS Quart. 33, 1, 71-90.
    • (2009) MIS Quart. , vol.33 , Issue.1 , pp. 71-90
    • Liang, H.1    Xue, Y.2
  • 38
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • DOI 10.1109/MCOM.2002.1039860
    • MANIKOPOULOS, C. AND PAPAVASSILIOU, S. 2002. Network intrusion and fault detection: A statistical anomaly approach. IEEE Comm. Mag. 40, 10, 76-82. (Pubitemid 35311949)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 40
    • 0031510754 scopus 로고    scopus 로고
    • Event studies in management research: Theoretical and empirical issues
    • MCWILLIAMS, A. AND SIEGEL, D. 1997. Event studies in management research: Theoretical and empirical issues Acad. Manag. J. 40, 3, 626-657.
    • (1997) Acad. Manag. J. , vol.40 , Issue.3 , pp. 626-657
    • Mcwilliams, A.1    Siegel, D.2
  • 44
    • 0033653826 scopus 로고    scopus 로고
    • Protection motivation and risk communication
    • NEUWIRTH, K., DUNWOODY, S., AND GRIFFIN, R. J. 2000. Protection motivation and risk communication. Risk Anal. 20, 5, 721-734.
    • (2000) Risk Anal. , vol.20 , Issue.5 , pp. 721-734
    • Neuwirth, K.1    Dunwoody, S.2    Griffin, R.J.3
  • 45
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • NG, B.-Y., KANKANHALLI, A., AND XU, Y. C. 2009. Studying users' computer security behavior: A health belief perspective. Decis. Support Syst. 46, 4, 815-825.
    • (2009) Decis. Support Syst. , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.C.3
  • 48
    • 63349088117 scopus 로고    scopus 로고
    • The deterrent and displacement effects of information security enforcement: International evidence
    • PNG, I., WANG, C., AND WANG, Q. 2008. The deterrent and displacement effects of information security enforcement: International evidence. J. Manag. Inf. Syst. 25, 2, 125-144.
    • (2008) J. Manag. Inf. Syst. , vol.25 , Issue.2 , pp. 125-144
    • Png, I.1    Wang, C.2    Wang, Q.3
  • 51
    • 55149100303 scopus 로고    scopus 로고
    • Learning about the world through long-term query logs
    • Article 21
    • RICHARDSON,M. 2008a. Learning about the world through long-term query logs. ACMTrans.Web 2, 4, Article 21.
    • (2008) ACM Trans. Web , vol.2 , pp. 4
    • Richardson, M.1
  • 53
    • 0023304222 scopus 로고
    • Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat
    • RIPPETOE, P. A., AND ROGERS, R.W. 1987. Effects of components of protection-motivation theory on adaptive and maladaptive coping with a health threat. J. Person. Social Psych. 52, 3, 596-604.
    • (1987) J. Person. Social Psych. , vol.52 , Issue.3 , pp. 596-604
    • Rippetoe, P.A.1    Rogers, R.W.2
  • 54
    • 0031418329 scopus 로고    scopus 로고
    • The dynamics of risk perception: How does perceived risk respond to risk events?
    • DOI 10.1111/j.1539-6924.1997.tb01280.x
    • ROGERS, G. O. 1997. The dynamics of risk perception: How does perceived risk respond to risk events? Risk Anal. 17, 6, 745-757. (Pubitemid 28123857)
    • (1997) Risk Analysis , vol.17 , Issue.6 , pp. 745-757
    • Rogers, G.O.1
  • 55
    • 0001840352 scopus 로고
    • A protectionmotivation theory of fear appeals and attitude change
    • ROGERS, R.W. 1975. A protectionmotivation theory of fear appeals and attitude change. J. Psych. 91, 1, 93-114.
    • (1975) J. Psych. , vol.91 , Issue.1 , pp. 93-114
    • Rogers, R.W.1
  • 57
    • 33645285028 scopus 로고    scopus 로고
    • Applying a health behavior theory to explore the influence of information and experience on arsenic risk representations, policy beliefs, and protective behavior
    • SEVERTSON, D. J., BAUMANN, L. C., AND BROWN, R.L. 2006. Applying a health behavior theory to explore the influence of information and experience on arsenic risk representations, policy beliefs, and protective behavior. Risk Anal. 26, 2, 353-368.
    • (2006) Risk Anal. , vol.26 , Issue.2 , pp. 353-368
    • Severtson, D.J.1    Baumann, L.C.2    Brown, R.L.3
  • 58
    • 0346336099 scopus 로고
    • Do risk information programs promote mitigating behavior?
    • SMITH, V. K., DESVOUSGES, W. H., AND PAYNE, J. W. 1995. Do risk information programs promote mitigating behavior? J. Risk Uncert. 10, 3, 203-221.
    • (1995) J. Risk Uncert. , vol.10 , Issue.3 , pp. 203-221
    • Smith, V.K.1    Desvousges, W.H.2    Payne, J.W.3
  • 59
    • 0000495988 scopus 로고
    • An empirical test of a model of external search for automobiles
    • SRINIVASAN, N. AND RATCHFORD, B. T. 1991. An empirical test of a model of external search for automobiles. J. Consum. Res. 18, 233-242.
    • (1991) J. Consum. Res. , vol.18 , pp. 233-242
    • Srinivasan, N.1    Ratchford, B.T.2
  • 61
    • 70349374682 scopus 로고    scopus 로고
    • A web search model for strategic decision making
    • VENKATSUBRAMANYAN, S. AND KWAN, S. K. 2008. A web search model for strategic decision making. AIMS Int. J. Manag. 2, 3, 197-214.
    • (2008) AIMS Int. J. Manag. , vol.2 , Issue.3 , pp. 197-214
    • Venkatsubramanyan, S.1    Kwan, S.K.2
  • 63
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • WORKMAN, M., BOMMER, W. H., AND STRAUB, D. 2008. Security lapses and the omission of information security measures: A threat control model and empirical test. Comput. Hum. Behav. 24, 6, 2799-2816.
    • (2008) Comput. Hum. Behav. , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 64
    • 30444435956 scopus 로고    scopus 로고
    • Help seeking behavior and the Internet: A national survey
    • DOI 10.1016/j.ijmedinf.2005.07.029, PII S1386505605001474, Health and the Internet for All
    • YBARRA, M. L. AND SUMANB, M. 2006. Help seeking behavior and the Internet: A national survey. Int. J. Med. Inf. 75, 1, 29-41. (Pubitemid 43075560)
    • (2006) International Journal of Medical Informatics , vol.75 , Issue.1 , pp. 29-41
    • Ybarra, M.L.1    Suman, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.