메뉴 건너뛰기




Volumn 46, Issue , 2009, Pages

Human information security behaviors: Differences across geographies and cultures in a global user survey

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84861424896     PISSN: None     EISSN: 15508390     Source Type: Journal    
DOI: 10.1002/meet.2009.145046022     Document Type: Conference Paper
Times cited : (1)

References (24)
  • 2
    • 23944472255 scopus 로고    scopus 로고
    • (2nd ed.). Amsterdam: Emerald Group Publishing
    • Case, D. O. (2007). Looking for information (2nd ed.). Amsterdam: Emerald Group Publishing.
    • (2007) Looking for information
    • Case, D.O.1
  • 3
    • 0012671648 scopus 로고    scopus 로고
    • Cultural differences in the online behavior of consumers: Understanding how different cultures use the net -As well as perceive the same web sites -can translate to truly global e-commerce
    • Chau, P. Y. K., Cole, M., Massey, A. P., Montoya-Weiss, M., & O'Keefe, R. M. (2002). Cultural differences in the online behavior of consumers: Understanding how different cultures use the net -As well as perceive the same Web sites -can translate to truly global e-commerce. Communications of the ACM, 45(10), 138-143.
    • (2002) Communications of the ACM , vol.45 , Issue.10 , pp. 138-143
    • Chau, P.Y.K.1    Cole, M.2    Massey, A.P.3    Montoya-Weiss, M.4    O'Keefe, R.M.5
  • 4
    • 79952080587 scopus 로고    scopus 로고
    • Cisco Systems. ( Retrieved from Cisco Systems, Inc. Web site
    • Cisco Systems. (2008a). Data leakage worldwide: Common risks and mistakes employees make . Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ white-paper-c11-499060.html.
    • (2008) Data leakage worldwide: Common risks and mistakes employees make
  • 5
    • 79952074033 scopus 로고    scopus 로고
    • Cisco Systems. (Retrieved from Cisco Systems, Inc. Web site
    • Cisco Systems. (2008b). Data leakage worldwider: The high cost of insider threats . Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/ US/solutions/collateral/ns170/ns896/ns895/white-paper-c11-506224.html.
    • (2008) Data leakage worldwider: The high cost of insider threats
  • 6
    • 79952093275 scopus 로고    scopus 로고
    • Cisco Systems. (Retrieved from Cisco Systems, Inc. Web site
    • Cisco Systems. (2008c). Data leakage worldwide: The effectiveness of security policies . Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ white-paper-c11-503131.html.
    • (2008) Data leakage worldwide: The effectiveness of security policies
  • 7
    • 59849106332 scopus 로고    scopus 로고
    • Information needs and information-seeking behavior in developing countries: A review of the research
    • doi:10.1016/j.iilr.2008.12.001
    • Dutta, R. (2008). Information needs and information-seeking behavior in developing countries: A review of the research . The International Information and Library Review, 2009 (41), 41-51. doi:10.1016/j.iilr.2008.12.001.
    • (2008) The International Information and Library Review , vol.2009 , Issue.41 , pp. 41-51
    • Dutta, R.1
  • 8
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • doi:10.1016/j.dss.2009.02.005
    • Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154-165. doi:10.1016/j.dss.2009. 02.005.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 9
    • 84861424318 scopus 로고    scopus 로고
    • InsightExpress. ( Retrieved from Cisco Systems, Inc. Web site
    • InsightExpress. ( 2008a). The challenge of data leakage for businesses and employees around the world. Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ Cisco-STL-Data-Leakage-2008-PR1.pdf.
    • (2008) The challenge of data leakage for businesses and employees around the world
  • 10
    • 79952093275 scopus 로고    scopus 로고
    • InsightExpress. (Retrieved from Cisco Systems, Inc. Web site
    • InsightExpress. (2008b). Data leakage worldwide: The effectiveness of corporate security policies. Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ Cisco-STL-Data-Leakage-2008-.pdf.
    • (2008) Data leakage worldwide: The effectiveness of corporate security policies
  • 11
    • 84861418099 scopus 로고    scopus 로고
    • InsightExpress. (Retrieved from Cisco Systems, Inc. Web site
    • InsightExpress. (2008c). Data leakage worldwide: The insider threat and the cost of data loss. Retrieved from Cisco Systems, Inc. Web site: http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/ Cisco-STL-Data-Leakage-2008.pdf.
    • (2008) Data leakage worldwide: The insider threat and the cost of data loss
  • 12
    • 70449816069 scopus 로고
    • The global network organization of the future: Information management opportunities and challenges
    • Jarvenpaa, S. L., & Ives, B. (1994). The global network organization of the future: Information management opportunities and challenges. Journal of Management Information Systems, 10 (4), 25-57.
    • (1994) Journal of Management Information Systems , vol.10 , Issue.4 , pp. 25-57
    • Jarvenpaa, S.L.1    Ives, B.2
  • 13
    • 35548991869 scopus 로고    scopus 로고
    • A model for understanding collaborative information behavior in context: A study of two healthcare teams
    • doi:10.1016/j.ipm.2006.12.010
    • Reddy, M. C., & Jansen, B. J. (2008). A model for understanding collaborative information behavior in context: A study of two healthcare teams. Information Processing and Management, 44(1), 256-273. doi:10.1016/j.ipm.2006. 12.010.
    • (2008) Information Processing and Management , vol.44 , Issue.1 , pp. 256-273
    • Reddy, M.C.1    Jansen, B.J.2
  • 14
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M. T. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 16
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • doi:10.1016/j.cose.2004.07.001
    • Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers and Security, 24(2), 124-133. doi:10.1016/j.cose.2004.07.001.
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 17
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, M. E., & von Solms, R. (1998). Information security awareness: educating your users effectively. Information Management & Computer Security, 6(4), 167-173.
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 20
    • 38249040223 scopus 로고
    • Information use and needs in manufacturing organizations: Organizational factors in information behavior
    • White, D. A. (1986). Information use and needs in manufacturing organizations: Organizational factors in information behavior. International Journal of Information Management, 1986(6), 157-170.
    • (1986) International Journal of Information Management , vol.1986 , Issue.6 , pp. 157-170
    • White, D.A.1
  • 21
    • 0031190395 scopus 로고    scopus 로고
    • Information behavior: An interdisciplinary perspective
    • Wilson, T. D. (1997). Information behavior: An interdisciplinary perspective. Information Processing and Management, 33(4), 551-572.
    • (1997) Information Processing and Management , vol.33 , Issue.4 , pp. 551-572
    • Wilson, T.D.1
  • 22
    • 33750706249 scopus 로고    scopus 로고
    • On user studies and information needs
    • Wilson, T. D. (2006). On user studies and information needs. Journal of Documentation, 62(6), 658-670.
    • (2006) Journal of Documentation , vol.62 , Issue.6 , pp. 658-670
    • Wilson, T.D.1
  • 23
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • doi:10.1016/j.chb.2008.04.005
    • Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24(6), 2799-2816. doi:10.1016/j.chb.2008.04.005.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 24
    • 0031488129 scopus 로고    scopus 로고
    • Country effects on information seeking in global electronic networks
    • Zaheer, S., & Zaheer, A. (1997). Country effects on information seeking in global electronic networks. Journal of International Business Studies, 28(1), 77-100.
    • (1997) Journal of International Business Studies , vol.28 , Issue.1 , pp. 77-100
    • Zaheer, S.1    Zaheer, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.