메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Disclosure of organizational information by employees on facebook: Looking at the potential for information security risks

Author keywords

Information disclosure; Information security; Online social networking; Social media

Indexed keywords

ACADEMIC LITERATURE; FACEBOOK; INFORMATION DISCLOSURE; INFORMATION SECURITY THREATS; ORGANIZATIONAL INFORMATION; SOCIAL MEDIA; WORK-RELATED;

EID: 84869109416     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (36)
  • 1
    • 84870387706 scopus 로고    scopus 로고
    • Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information
    • Brisbane, Australia: Association of Information Systems
    • Abdul Molok, N.N., Ahmad, A., and Chang, S. 2010a. "Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information", 21st Australasian Conference on Information Systems (ACIS2010), Brisbane, Australia: Association of Information Systems.
    • (2010) 21st Australasian Conference on Information Systems (ACIS2010)
    • Abdul Molok, N.N.1    Ahmad, A.2    Chang, S.3
  • 2
    • 84864567494 scopus 로고    scopus 로고
    • Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats
    • D.C. Bolan (ed.), Perth, Western Australia: Security Research Centre, Edith Cowan University
    • Abdul Molok, N.N., Chang, S., and Ahmad, A. 2010b. "Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats", 8th Australian Information Security Management Conference, D.C. Bolan (ed.), Perth, Western Australia: Security Research Centre, Edith Cowan University.
    • (2010) 8th Australian Information Security Management Conference
    • Abdul Molok, N.N.1    Chang, S.2    Ahmad, A.3
  • 3
    • 43849100439 scopus 로고    scopus 로고
    • The Ethics of Organizational Secrets
    • Anand, V., and Rosen, C.C. 2008. "The Ethics of Organizational Secrets", Journal of Management Inquiry (17:2), pp 97-101.
    • (2008) Journal of Management Inquiry , vol.17 , Issue.2 , pp. 97-101
    • Anand, V.1    Rosen, C.C.2
  • 6
    • 77957061746 scopus 로고    scopus 로고
    • Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness", MIS Quarterly (34:3), pp 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 7
    • 84855851700 scopus 로고    scopus 로고
    • Human Factors in Information Security: The Insider Threat-Who Can You Trust These Days?
    • (in press)
    • Colwill, C. 2010. "Human Factors in Information Security: The Insider Threat-Who Can You Trust These Days?", Information Security Technical Report (in press).
    • (2010) Information Security Technical Report
    • Colwill, C.1
  • 9
    • 77955356527 scopus 로고    scopus 로고
    • Social Media: Opportunity or Risk?
    • in
    • Everett, C. 2010. "Social Media: Opportunity or Risk?", in: Computer Fraud & Security. pp. 8-10.
    • (2010) Computer Fraud & Security , pp. 8-10
    • Everett, C.1
  • 10
    • 80054047300 scopus 로고    scopus 로고
    • Forrester, Forrester Research, Inc., Cambridge, Massachusetts
    • Forrester. 2010. "The Value of Corporate Secrets", Forrester Research, Inc., Cambridge, Massachusetts.
    • (2010) The Value of Corporate Secrets
  • 11
    • 84869135645 scopus 로고    scopus 로고
    • Execs Worry That Facebook, Twitter Use Could Lead to Data Leaks
    • Retrieved 2 June 2010, from
    • Gaudin, S. 2009. "Execs Worry That Facebook, Twitter Use Could Lead to Data Leaks. " ComputerWorld Retrieved 2 June 2010, from http://www.computerworld.com/s/article/9136465/Execs_worry_that_Facebook_Twitter_use_could_lead_to_data_leaks
    • (2009) ComputerWorld
    • Gaudin, S.1
  • 12
    • 33749016498 scopus 로고    scopus 로고
    • Information Revelation and Privacy in Online Social Networks (the Facebook Case)
    • 2005, Virginia, USA: ACM
    • Gross, R., and Acquisti, A. 2005. "Information Revelation and Privacy in Online Social Networks (the Facebook Case)", ACM Workshop on Privacy in the Electronic Society (WPES), 2005, Virginia, USA: ACM.
    • (2005) ACM Workshop on Privacy in the Electronic Society (WPES)
    • Gross, R.1    Acquisti, A.2
  • 13
    • 84862955781 scopus 로고    scopus 로고
    • The Use of Online Social Networking for Higher Education from an Activity Theory Perspective
    • Taipei, Taiwan: Association of Information Systems
    • Hamid, S., Waycott, J., Kurnia, S., and Chang, S. 2010. "The Use of Online Social Networking for Higher Education from an Activity Theory Perspective", 14th Pacific Asia Conference on Information Systems (PACIS 2010), Taipei, Taiwan: Association of Information Systems.
    • (2010) 14th Pacific Asia Conference on Information Systems (PACIS 2010)
    • Hamid, S.1    Waycott, J.2    Kurnia, S.3    Chang, S.4
  • 14
    • 84869119220 scopus 로고    scopus 로고
    • Industrial Espionage
    • in:, Hastings, New Zealand: IsecT Ltd
    • Hinson, G. 2010. "Industrial Espionage", in: NoticeBored Newsletter. Hastings, New Zealand: IsecT Ltd., pp. 1-7.
    • (2010) NoticeBored Newsletter , pp. 1-7
    • Hinson, G.1
  • 15
    • 84869102395 scopus 로고    scopus 로고
    • Information Leakage
    • ISF., Retrieved 19 November 2009, from
    • ISF. 2007. "Information Leakage. " Information Security Forum Briefing No.4 Retrieved 19 November 2009, from www.securityforum.org
    • (2007) Information Security Forum Briefing No.4
  • 17
    • 70349625308 scopus 로고    scopus 로고
    • Future Employment Selection Methods: Evaluating Social Networking Web Sites
    • Kluemper, D.H., and Rosen, P.A. 2009. "Future Employment Selection Methods: Evaluating Social Networking Web Sites", Journal of Managerial Psychology (24:6), pp 567-580.
    • (2009) Journal of Managerial Psychology , vol.24 , Issue.6 , pp. 567-580
    • Kluemper, D.H.1    Rosen, P.A.2
  • 18
    • 0001399707 scopus 로고    scopus 로고
    • Qualitative Research in Organizational and Vocational Psychology, 1979-1999
    • Lee, T.W., Mitchell, T.R., and Sablynski, C.J. 1999. "Qualitative Research in Organizational and Vocational Psychology, 1979-1999", Journal of Vocational Behavior (55), pp 161-187.
    • (1999) Journal of Vocational Behavior , vol.55 , pp. 161-187
    • Lee, T.W.1    Mitchell, T.R.2    Sablynski, C.J.3
  • 19
    • 84864561060 scopus 로고    scopus 로고
    • Security Issues Challenging Facebook
    • C. Bolan (ed.), Perth, Western Australia: Edith Cowan University
    • Leitch, S., and Warren, M. 2009. "Security Issues Challenging Facebook", 7th Australian Information Security Management Conference, C. Bolan (ed.), Perth, Western Australia: Edith Cowan University, pp. 137-142.
    • (2009) 7th Australian Information Security Management Conference , pp. 137-142
    • Leitch, S.1    Warren, M.2
  • 20
    • 84864559664 scopus 로고    scopus 로고
    • Retrieved January 25, 2010, from
    • Mansfield, R. 2010. "Uk Mod Secrets Leaked onto the Internet. " Retrieved January 25, 2010, from http://news.sky.com/skynews/Home/UK-News/Ministry-of-Defence-Staff-Have-Leaked-Secret-Information-16-Times-Onto-Social-Networking-Sites/Article/201001415535304
    • (2010) Uk Mod Secrets Leaked onto the Internet
    • Mansfield, R.1
  • 21
    • 73149085290 scopus 로고    scopus 로고
    • Awareness Training 2.0
    • in
    • McKenna, B. 2009. "Awareness Training 2.0", in: InfoSecurity. pp. 18-21.
    • (2009) InfoSecurity , pp. 18-21
    • McKenna, B.1
  • 22
    • 77957076927 scopus 로고    scopus 로고
    • Information About Information: A Taxonomy of Views
    • McKinney, E.H., and Yoos, C.J. 2010. "Information About Information: A Taxonomy of Views", MIS Quarterly (34:2), pp 329-344.
    • (2010) MIS Quarterly , vol.34 , Issue.2 , pp. 329-344
    • McKinney, E.H.1    Yoos, C.J.2
  • 23
    • 84864573619 scopus 로고    scopus 로고
    • Us Congressman Twitters Secret Trip to Iraq
    • in
    • Ng, V. 2009. "Us Congressman Twitters Secret Trip to Iraq", in: Search Security Asia.
    • (2009) Search Security Asia
    • Ng, V.1
  • 24
    • 76949093866 scopus 로고    scopus 로고
    • All About Me: Disclosure in Online Social Networking Profiles: The Case of Facebook
    • Nosko, A., Wood, E., and Molema, S. 2010. "All About Me: Disclosure in Online Social Networking Profiles: The Case of Facebook", Computers in Human Behavior (26), pp 406-418.
    • (2010) Computers in Human Behavior , vol.26 , pp. 406-418
    • Nosko, A.1    Wood, E.2    Molema, S.3
  • 25
    • 84869105976 scopus 로고    scopus 로고
    • The Facebook Data Torrent Debacle: Q&A
    • in:, San Fransisco: PCWorld Communciations
    • Paul, I. 2010. "The Facebook Data Torrent Debacle: Q&A", in: PCWorld. San Fransisco: PCWorld Communciations.
    • (2010) PCWorld
    • Paul, I.1
  • 26
    • 84869102400 scopus 로고    scopus 로고
    • Special Report: Industry Experts Debate Social Networking Risks
    • in
    • Schneier, B. 2009. "Special Report: Industry Experts Debate Social Networking Risks", in: Security Asia.
    • (2009) Security Asia
    • Schneier, B.1
  • 28
    • 84862930210 scopus 로고    scopus 로고
    • Case Study: Using Security Awareness to Combat the Advanced Persistent Threat
    • University of Alaska, Fairbanks, Seattle: CISSE
    • Smith, A.M., and Toppel, N.Y. 2009. "Case Study: Using Security Awareness to Combat the Advanced Persistent Threat", 13th Colloquium for Information Systems Security Education (CISSE), University of Alaska, Fairbanks, Seattle: CISSE, pp. 64-70.
    • (2009) 13th Colloquium for Information Systems Security Education (CISSE) , pp. 64-70
    • Smith, A.M.1    Toppel, N.Y.2
  • 29
    • 79951758149 scopus 로고    scopus 로고
    • Sophos., Sophos Group, Boston, Massachusetts
    • Sophos. 2010. "Security Threat Report: 2010", Sophos Group, Boston, Massachusetts.
    • (2010) Security Threat Report: 2010
  • 30
    • 79958072176 scopus 로고    scopus 로고
    • Facebook in Privacy Breach: Top-Ranked Applications Transmit Personal Ids, a Journal Investigation Finds
    • in:, New York, USA: Dow Jones & Company, Inc
    • Steel, E., and Fowler, G. 2010. "Facebook in Privacy Breach: Top-Ranked Applications Transmit Personal Ids, a Journal Investigation Finds", in: The Wall Street Journal. New York, USA: Dow Jones & Company, Inc.
    • (2010) The Wall Street Journal
    • Steel, E.1    Fowler, G.2
  • 32
    • 70350266278 scopus 로고    scopus 로고
    • Exploring Virtual Worlds: Success Factors in Virtual World Marketing
    • Tikkanen, H., Hietanen, J., Henttonen, T., and Rokka, J. 2009. "Exploring Virtual Worlds: Success Factors in Virtual World Marketing", Management Decision (47:8), pp 1357-1381.
    • (2009) Management Decision , vol.47 , Issue.8 , pp. 1357-1381
    • Tikkanen, H.1    Hietanen, J.2    Henttonen, T.3    Rokka, J.4
  • 34
    • 67650083389 scopus 로고    scopus 로고
    • Social Networking: The Business Case
    • in:, Institution of Engineering & Technology
    • Wilson, J. 2009. "Social Networking: The Business Case", in: Engineering & Technology. Institution of Engineering & Technology, pp. 54-56.
    • (2009) Engineering & Technology , pp. 54-56
    • Wilson, J.1
  • 36
    • 77956190283 scopus 로고    scopus 로고
    • Policies and Procedures to Manage Employee Internet Abuse
    • Young, K. 2010. "Policies and Procedures to Manage Employee Internet Abuse", Computers in Human Behavior (26), pp 1467-1471.
    • (2010) Computers in Human Behavior , vol.26 , pp. 1467-1471
    • Young, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.