-
1
-
-
84870387706
-
Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information
-
Brisbane, Australia: Association of Information Systems
-
Abdul Molok, N.N., Ahmad, A., and Chang, S. 2010a. "Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information", 21st Australasian Conference on Information Systems (ACIS2010), Brisbane, Australia: Association of Information Systems.
-
(2010)
21st Australasian Conference on Information Systems (ACIS2010)
-
-
Abdul Molok, N.N.1
Ahmad, A.2
Chang, S.3
-
2
-
-
84864567494
-
Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats
-
D.C. Bolan (ed.), Perth, Western Australia: Security Research Centre, Edith Cowan University
-
Abdul Molok, N.N., Chang, S., and Ahmad, A. 2010b. "Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats", 8th Australian Information Security Management Conference, D.C. Bolan (ed.), Perth, Western Australia: Security Research Centre, Edith Cowan University.
-
(2010)
8th Australian Information Security Management Conference
-
-
Abdul Molok, N.N.1
Chang, S.2
Ahmad, A.3
-
3
-
-
43849100439
-
The Ethics of Organizational Secrets
-
Anand, V., and Rosen, C.C. 2008. "The Ethics of Organizational Secrets", Journal of Management Inquiry (17:2), pp 97-101.
-
(2008)
Journal of Management Inquiry
, vol.17
, Issue.2
, pp. 97-101
-
-
Anand, V.1
Rosen, C.C.2
-
4
-
-
77950128950
-
Antisocial Networks: Turning a Social Network into a Botnet
-
Taipei, Taiwan
-
Athanasopoulos, E., Makridakis, A., Antonatos, S., Ioannidis, S., Anagnostakis, K., and Markatos, E. 2008. "Antisocial Networks: Turning a Social Network into a Botnet", 11th Information Security Conference (ISC 2008), Taipei, Taiwan.
-
(2008)
11th Information Security Conference (ISC 2008)
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
Ioannidis, S.4
Anagnostakis, K.5
Markatos, E.6
-
6
-
-
77957061746
-
Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
-
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness", MIS Quarterly (34:3), pp 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
7
-
-
84855851700
-
Human Factors in Information Security: The Insider Threat-Who Can You Trust These Days?
-
(in press)
-
Colwill, C. 2010. "Human Factors in Information Security: The Insider Threat-Who Can You Trust These Days?", Information Security Technical Report (in press).
-
(2010)
Information Security Technical Report
-
-
Colwill, C.1
-
8
-
-
77950821999
-
Motivations for Social Networking at Work
-
San Diego, California: ACM
-
DiMicco, J., Millen, D.R., Geyer, W., Dugan, C., Brownholtz, B., and Muller, M. 2008. "Motivations for Social Networking at Work", Computer Supported Cooperative Work (CSCW'08), San Diego, California: ACM.
-
(2008)
Computer Supported Cooperative Work (CSCW'08)
-
-
DiMicco, J.1
Millen, D.R.2
Geyer, W.3
Dugan, C.4
Brownholtz, B.5
Muller, M.6
-
9
-
-
77955356527
-
Social Media: Opportunity or Risk?
-
in
-
Everett, C. 2010. "Social Media: Opportunity or Risk?", in: Computer Fraud & Security. pp. 8-10.
-
(2010)
Computer Fraud & Security
, pp. 8-10
-
-
Everett, C.1
-
10
-
-
80054047300
-
-
Forrester, Forrester Research, Inc., Cambridge, Massachusetts
-
Forrester. 2010. "The Value of Corporate Secrets", Forrester Research, Inc., Cambridge, Massachusetts.
-
(2010)
The Value of Corporate Secrets
-
-
-
11
-
-
84869135645
-
Execs Worry That Facebook, Twitter Use Could Lead to Data Leaks
-
Retrieved 2 June 2010, from
-
Gaudin, S. 2009. "Execs Worry That Facebook, Twitter Use Could Lead to Data Leaks. " ComputerWorld Retrieved 2 June 2010, from http://www.computerworld.com/s/article/9136465/Execs_worry_that_Facebook_Twitter_use_could_lead_to_data_leaks
-
(2009)
ComputerWorld
-
-
Gaudin, S.1
-
12
-
-
33749016498
-
Information Revelation and Privacy in Online Social Networks (the Facebook Case)
-
2005, Virginia, USA: ACM
-
Gross, R., and Acquisti, A. 2005. "Information Revelation and Privacy in Online Social Networks (the Facebook Case)", ACM Workshop on Privacy in the Electronic Society (WPES), 2005, Virginia, USA: ACM.
-
(2005)
ACM Workshop on Privacy in the Electronic Society (WPES)
-
-
Gross, R.1
Acquisti, A.2
-
13
-
-
84862955781
-
The Use of Online Social Networking for Higher Education from an Activity Theory Perspective
-
Taipei, Taiwan: Association of Information Systems
-
Hamid, S., Waycott, J., Kurnia, S., and Chang, S. 2010. "The Use of Online Social Networking for Higher Education from an Activity Theory Perspective", 14th Pacific Asia Conference on Information Systems (PACIS 2010), Taipei, Taiwan: Association of Information Systems.
-
(2010)
14th Pacific Asia Conference on Information Systems (PACIS 2010)
-
-
Hamid, S.1
Waycott, J.2
Kurnia, S.3
Chang, S.4
-
14
-
-
84869119220
-
Industrial Espionage
-
in:, Hastings, New Zealand: IsecT Ltd
-
Hinson, G. 2010. "Industrial Espionage", in: NoticeBored Newsletter. Hastings, New Zealand: IsecT Ltd., pp. 1-7.
-
(2010)
NoticeBored Newsletter
, pp. 1-7
-
-
Hinson, G.1
-
15
-
-
84869102395
-
Information Leakage
-
ISF., Retrieved 19 November 2009, from
-
ISF. 2007. "Information Leakage. " Information Security Forum Briefing No.4 Retrieved 19 November 2009, from www.securityforum.org
-
(2007)
Information Security Forum Briefing No.4
-
-
-
16
-
-
34848911641
-
Social Phishing
-
Jagatic, T., Johnson, N., Jakobsson, M., and Menczer, F. 2007. "Social Phishing", Communications of the ACM (20:10), pp 94-100.
-
(2007)
Communications of the ACM
, vol.20
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
17
-
-
70349625308
-
Future Employment Selection Methods: Evaluating Social Networking Web Sites
-
Kluemper, D.H., and Rosen, P.A. 2009. "Future Employment Selection Methods: Evaluating Social Networking Web Sites", Journal of Managerial Psychology (24:6), pp 567-580.
-
(2009)
Journal of Managerial Psychology
, vol.24
, Issue.6
, pp. 567-580
-
-
Kluemper, D.H.1
Rosen, P.A.2
-
18
-
-
0001399707
-
Qualitative Research in Organizational and Vocational Psychology, 1979-1999
-
Lee, T.W., Mitchell, T.R., and Sablynski, C.J. 1999. "Qualitative Research in Organizational and Vocational Psychology, 1979-1999", Journal of Vocational Behavior (55), pp 161-187.
-
(1999)
Journal of Vocational Behavior
, vol.55
, pp. 161-187
-
-
Lee, T.W.1
Mitchell, T.R.2
Sablynski, C.J.3
-
19
-
-
84864561060
-
Security Issues Challenging Facebook
-
C. Bolan (ed.), Perth, Western Australia: Edith Cowan University
-
Leitch, S., and Warren, M. 2009. "Security Issues Challenging Facebook", 7th Australian Information Security Management Conference, C. Bolan (ed.), Perth, Western Australia: Edith Cowan University, pp. 137-142.
-
(2009)
7th Australian Information Security Management Conference
, pp. 137-142
-
-
Leitch, S.1
Warren, M.2
-
20
-
-
84864559664
-
-
Retrieved January 25, 2010, from
-
Mansfield, R. 2010. "Uk Mod Secrets Leaked onto the Internet. " Retrieved January 25, 2010, from http://news.sky.com/skynews/Home/UK-News/Ministry-of-Defence-Staff-Have-Leaked-Secret-Information-16-Times-Onto-Social-Networking-Sites/Article/201001415535304
-
(2010)
Uk Mod Secrets Leaked onto the Internet
-
-
Mansfield, R.1
-
21
-
-
73149085290
-
Awareness Training 2.0
-
in
-
McKenna, B. 2009. "Awareness Training 2.0", in: InfoSecurity. pp. 18-21.
-
(2009)
InfoSecurity
, pp. 18-21
-
-
McKenna, B.1
-
22
-
-
77957076927
-
Information About Information: A Taxonomy of Views
-
McKinney, E.H., and Yoos, C.J. 2010. "Information About Information: A Taxonomy of Views", MIS Quarterly (34:2), pp 329-344.
-
(2010)
MIS Quarterly
, vol.34
, Issue.2
, pp. 329-344
-
-
McKinney, E.H.1
Yoos, C.J.2
-
23
-
-
84864573619
-
Us Congressman Twitters Secret Trip to Iraq
-
in
-
Ng, V. 2009. "Us Congressman Twitters Secret Trip to Iraq", in: Search Security Asia.
-
(2009)
Search Security Asia
-
-
Ng, V.1
-
24
-
-
76949093866
-
All About Me: Disclosure in Online Social Networking Profiles: The Case of Facebook
-
Nosko, A., Wood, E., and Molema, S. 2010. "All About Me: Disclosure in Online Social Networking Profiles: The Case of Facebook", Computers in Human Behavior (26), pp 406-418.
-
(2010)
Computers in Human Behavior
, vol.26
, pp. 406-418
-
-
Nosko, A.1
Wood, E.2
Molema, S.3
-
25
-
-
84869105976
-
The Facebook Data Torrent Debacle: Q&A
-
in:, San Fransisco: PCWorld Communciations
-
Paul, I. 2010. "The Facebook Data Torrent Debacle: Q&A", in: PCWorld. San Fransisco: PCWorld Communciations.
-
(2010)
PCWorld
-
-
Paul, I.1
-
26
-
-
84869102400
-
Special Report: Industry Experts Debate Social Networking Risks
-
in
-
Schneier, B. 2009. "Special Report: Industry Experts Debate Social Networking Risks", in: Security Asia.
-
(2009)
Security Asia
-
-
Schneier, B.1
-
27
-
-
84862959605
-
Virtual Teams: Information Types for Effective Functioning
-
in:, Suzhou, People's Republic of China: AIS
-
Shaari, I., Chang, S., and Shanks, G. 2008. "Virtual Teams: Information Types for Effective Functioning", in: 12th Pacific Asia Conference on Information Systems (PACIS). Suzhou, People's Republic of China: AIS.
-
(2008)
12th Pacific Asia Conference on Information Systems (PACIS)
-
-
Shaari, I.1
Chang, S.2
Shanks, G.3
-
28
-
-
84862930210
-
Case Study: Using Security Awareness to Combat the Advanced Persistent Threat
-
University of Alaska, Fairbanks, Seattle: CISSE
-
Smith, A.M., and Toppel, N.Y. 2009. "Case Study: Using Security Awareness to Combat the Advanced Persistent Threat", 13th Colloquium for Information Systems Security Education (CISSE), University of Alaska, Fairbanks, Seattle: CISSE, pp. 64-70.
-
(2009)
13th Colloquium for Information Systems Security Education (CISSE)
, pp. 64-70
-
-
Smith, A.M.1
Toppel, N.Y.2
-
29
-
-
79951758149
-
-
Sophos., Sophos Group, Boston, Massachusetts
-
Sophos. 2010. "Security Threat Report: 2010", Sophos Group, Boston, Massachusetts.
-
(2010)
Security Threat Report: 2010
-
-
-
30
-
-
79958072176
-
Facebook in Privacy Breach: Top-Ranked Applications Transmit Personal Ids, a Journal Investigation Finds
-
in:, New York, USA: Dow Jones & Company, Inc
-
Steel, E., and Fowler, G. 2010. "Facebook in Privacy Breach: Top-Ranked Applications Transmit Personal Ids, a Journal Investigation Finds", in: The Wall Street Journal. New York, USA: Dow Jones & Company, Inc.
-
(2010)
The Wall Street Journal
-
-
Steel, E.1
Fowler, G.2
-
32
-
-
70350266278
-
Exploring Virtual Worlds: Success Factors in Virtual World Marketing
-
Tikkanen, H., Hietanen, J., Henttonen, T., and Rokka, J. 2009. "Exploring Virtual Worlds: Success Factors in Virtual World Marketing", Management Decision (47:8), pp 1357-1381.
-
(2009)
Management Decision
, vol.47
, Issue.8
, pp. 1357-1381
-
-
Tikkanen, H.1
Hietanen, J.2
Henttonen, T.3
Rokka, J.4
-
34
-
-
67650083389
-
Social Networking: The Business Case
-
in:, Institution of Engineering & Technology
-
Wilson, J. 2009. "Social Networking: The Business Case", in: Engineering & Technology. Institution of Engineering & Technology, pp. 54-56.
-
(2009)
Engineering & Technology
, pp. 54-56
-
-
Wilson, J.1
-
35
-
-
33846344673
-
Punishment and Ethics Deterrents: A Study of Insider Security Contravention
-
Workman, M., and Gathegi, J. 2007. "Punishment and Ethics Deterrents: A Study of Insider Security Contravention", Journal of the American Society for Information Science and Technology (58:2), pp 212-222.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 212-222
-
-
Workman, M.1
Gathegi, J.2
-
36
-
-
77956190283
-
Policies and Procedures to Manage Employee Internet Abuse
-
Young, K. 2010. "Policies and Procedures to Manage Employee Internet Abuse", Computers in Human Behavior (26), pp 1467-1471.
-
(2010)
Computers in Human Behavior
, vol.26
, pp. 1467-1471
-
-
Young, K.1
|