메뉴 건너뛰기




Volumn 31, Issue 5, 2012, Pages 673-680

Taxonomy of compliant information security behavior

Author keywords

Access control; Behavior; Compliance; Deterrence control; Motivation

Indexed keywords

BEHAVIOR; COMPLIANCE; EMPIRICAL STUDIES; END-USER PERSPECTIVE; END-USERS; INFORMATION SECURITY POLICIES; INTRINSIC MOTIVATION; SELF-DETERMINATION THEORIES;

EID: 84862271726     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.04.004     Document Type: Article
Times cited : (125)

References (35)
  • 3
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security in the workplace: Linking information security climate to compliant behavior
    • M. Chan, I. Woon, and A. Kankanhalli Perceptions of information security in the workplace: linking information security climate to compliant behavior Journal of Information Privacy and Security 1 2006 18 41
    • (2006) Journal of Information Privacy and Security , vol.1 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 4
    • 34848873123 scopus 로고    scopus 로고
    • Deterring internal information systems misuse
    • DOI 10.1145/1290958.1290971, 1290971
    • D. D'Arcy, and A. Hovav Deterring internal information systems misuse Communications of the ACM 50 2007 113 117 (Pubitemid 47505008)
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 113-117
    • D'Arcy, J.1    Hovav, A.2
  • 5
    • 67349280492 scopus 로고    scopus 로고
    • Does one size fit all? Examining the differential effects of IS security countermeasures
    • D. D'Arcy, and A. Hovav Does one size fit all? Examining the differential effects of IS security countermeasures Journal of Business Ethics 89 2009 57 71
    • (2009) Journal of Business Ethics , vol.89 , pp. 57-71
    • D'Arcy, D.1    Hovav, A.2
  • 6
    • 80455178572 scopus 로고    scopus 로고
    • A review and analysis of deterrence theory in the IS security literature: Making sense of disparate findings
    • D. D'Arcy, and T. Herath A review and analysis of deterrence theory in the IS security literature: making sense of disparate findings European Journal of Information Systems 20 2011 643 658
    • (2011) European Journal of Information Systems , vol.20 , pp. 643-658
    • D'Arcy, D.1    Herath, T.2
  • 8
    • 63349084985 scopus 로고    scopus 로고
    • [cited 26 October 2010] Available from
    • Deloitte Global security survey [cited 26 October 2010] 2007 Available from: http://www.deloitte.com/view/en-GX/global/industries/financial-services/ 5f5d5724a82fb110VgnVCM100000ba42f00aRCRD.htm
    • (2007) Global Security Survey
  • 9
    • 61349200300 scopus 로고    scopus 로고
    • From culture to disobedience: Recognising the varying user acceptance of IT security
    • S. Furnell, and K.-L. Thomson From culture to disobedience: recognising the varying user acceptance of IT security Computer Fraud & Security 2009 2009 5 10
    • (2009) Computer Fraud & Security , vol.2009 , pp. 5-10
    • Furnell, S.1    Thomson, K.-L.2
  • 10
    • 12344305644 scopus 로고    scopus 로고
    • Self-control, deviant peers, and software piracy
    • E. George, G.E. Higgins, and D.A. Makin Self-Control, deviant peers and software piracy Psychological Reports 95 2004 921 931 (Pubitemid 40131934)
    • (2004) Psychological Reports , vol.95 , Issue.3 , pp. 921-931
    • Higgins, G.E.1    Makin, D.A.2
  • 11
    • 84935667238 scopus 로고
    • Conscience, significant others, and rational choice: Extending the deterrence model
    • H.G. Grasmick, and R.J. Bursik Conscience, significant others, and rational choice: extending the deterrence model Law & Society Review 24 1990 837 862
    • (1990) Law & Society Review , vol.24 , pp. 837-862
    • Grasmick, H.G.1    Bursik, R.J.2
  • 12
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behavior in organizations: Role of penalties, pressures and perceived effectiveness
    • T. Herath, and H.R. Rao Encouraging information security behavior in organizations: role of penalties, pressures and perceived effectiveness Decision Support Systems 47 2009 154 165
    • (2009) Decision Support Systems , vol.47 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 13
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations European Journal of Information Systems 18 2009 106 125
    • (2009) European Journal of Information Systems , vol.18 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 16
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    • P. Ifinedo Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory Computers & Security 31 2011 83 95
    • (2011) Computers & Security , vol.31 , pp. 83-95
    • Ifinedo, P.1
  • 18
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • J. Leach Improving user security behaviour Computers & Security 22 2003 685 692
    • (2003) Computers & Security , vol.22 , pp. 685-692
    • Leach, J.1
  • 19
    • 84862270515 scopus 로고    scopus 로고
    • Open source software adoption: Motivations of adopters and amotivations of non-adopters
    • Y. Li, T. Chan-Hoo, X. Heng, and T. Hock-Hai Open source software adoption: motivations of adopters and amotivations of non-adopters SIGMIS Database 42 2011 76 94
    • (2011) SIGMIS Database , vol.42 , pp. 76-94
    • Li, Y.1    Chan-Hoo, T.2    Heng, X.3    Hock-Hai, T.4
  • 20
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of IT misuse
    • DOI 10.1016/S0167-4048(02)00109-8
    • G.B. Magklaras, and S.M. Furnell Insider threat prediction tool: evaluating the probability of IT misuse Computers & Security 21 2001 62 73 (Pubitemid 34133784)
    • (1998) Computers and Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 25
    • 0002209063 scopus 로고    scopus 로고
    • Intrinsic and extrinsic motivations: Classic definitions and new directions
    • R.M. Ryan, and E.L. Deci Intrinsic and extrinsic motivations: classic definitions and new directions Contemporary Educational Psychology 25 2000 54 67
    • (2000) Contemporary Educational Psychology , vol.25 , pp. 54-67
    • Ryan, R.M.1    Deci, E.L.2
  • 26
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • DOI 10.1016/S0167-4048(02)01009-X
    • E.E. Schultz A framework for understanding and predicting insider attacks Computers & Security 21 2002 526 531 (Pubitemid 35186246)
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 28
    • 0025430236 scopus 로고
    • Criminological concepts and research findings relevant for improving computer crime control
    • DOI 10.1016/0167-4048(90)90166-Q
    • S. Sherizen Criminological concepts and research findings relevant for improving computer crime control Computers & Security 9 1990 215 222 (Pubitemid 20694883)
    • (1990) Computers and Security , vol.9 , Issue.3 , pp. 215-222
    • Sherizen Sanford1
  • 30
    • 77149132467 scopus 로고    scopus 로고
    • Compliance with information security policies: An empirical investigation
    • M. Siponen, S. Pahnila, and M.A. Mahmood Compliance with information security policies: an empirical investigation Computer 43 2010 64 71
    • (2010) Computer , vol.43 , pp. 64-71
    • Siponen, M.1    Pahnila, S.2    Mahmood, M.A.3
  • 33
    • 70349569700 scopus 로고    scopus 로고
    • What needs tell us about user experience
    • T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P. Palanque, R. Prates, Springer Berlin/Heidelberg
    • A. Wiklund-Engblom, M. Hassenzahl, A. Bengs, and S. Sperring What needs tell us about user experience T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P. Palanque, R. Prates, Human-computer interaction - INTERACT 2009 2009 Springer Berlin/Heidelberg 666 669
    • (2009) Human-computer Interaction - INTERACT 2009 , pp. 666-669
    • Wiklund-Engblom, A.1    Hassenzahl, M.2    Bengs, A.3    Sperring, S.4
  • 34
    • 70149119150 scopus 로고    scopus 로고
    • Overcoming the insider: Reducing employee computer crime through situational crime prevention
    • R. Willison, and M. Siponen Overcoming the insider: reducing employee computer crime through situational crime prevention Communications of the ACM 52 2009 133 137
    • (2009) Communications of the ACM , vol.52 , pp. 133-137
    • Willison, R.1    Siponen, M.2
  • 35
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • M. Workman, W.H. Bommer, and D. Straub Security lapses and the omission of information security measures: a threat control model and empirical test Computers in Human Behavior 24 2008 2799 2816
    • (2008) Computers in Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.