메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Understanding the factors of information leakage through online social networking to safeguard organizational information

Author keywords

Information leakage; Information security; Online social networking; Unauthorised information disclosure

Indexed keywords

ACADEMIC LITERATURE; INFORMATION DISCLOSURE; INFORMATION LEAKAGE; INFORMATION SECURITY EDUCATION; INSIDER THREAT; ORGANIZATIONAL INFORMATION; THEORETICAL MODELS; THEORY OF PLANNED BEHAVIOUR; UNDERLYING FACTORS;

EID: 84870387706     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (40)
  • 1
    • 34249279137 scopus 로고    scopus 로고
    • An Information-Centric Approach to Data Security in Organizations
    • Ahmad, A., Ruighaver, A.B., and Teo, W.T. 2005. "An Information-Centric Approach to Data Security in Organizations, " TENCON 2005 2005 IEEE Region 10, pp. 1-5.
    • (2005) TENCON 2005 2005 IEEE Region , vol.10 , pp. 1-5
    • Ahmad, A.1    Ruighaver, A.B.2    Teo, W.T.3
  • 3
    • 57649097311 scopus 로고    scopus 로고
    • Information Security Management: A Human Challenge?
    • Ashenden, D. 2008. "Information Security Management: A Human Challenge?, " Information Security Technical Report (13:4), pp 195-201.
    • (2008) Information Security Technical Report , vol.13 , Issue.4 , pp. 195-201
    • Ashenden, D.1
  • 6
    • 84869125412 scopus 로고    scopus 로고
    • Data Leakage Worldwide: Common Risks and Mistakes Employees Make
    • CISCO., San Jose, CA: CISCO Systems Inc
    • CISCO. 2008. "Data Leakage Worldwide: Common Risks and Mistakes Employees Make, " in: CISCO Systems White Paper. San Jose, CA: CISCO Systems Inc.
    • (2008) CISCO Systems White Paper
  • 7
    • 84855851700 scopus 로고    scopus 로고
    • Human Factors in Information Security: The Insider Threat-Who Can You Trust These Days?
    • (in press)
    • Colwill, C. 2010. "Human Factors in Information Security: The Insider Threat-Who Can You Trust These Days?, " Information Security Technical Report (in press).
    • (2010) Information Security Technical Report
    • Colwill, C.1
  • 8
    • 77955356527 scopus 로고    scopus 로고
    • Social Media: Opportunity or Risk?
    • pp. 8-10
    • Everett, C. 2010. "Social Media: Opportunity or Risk?, " in: Computer Fraud & Security. pp. 8-10.
    • (2010) Computer Fraud & Security
    • Everett, C.1
  • 9
    • 77952944272 scopus 로고    scopus 로고
    • Facebook, Retrieved 14 Sept 2010, from
    • Facebook. 2010. "Facebook Statistics. " Retrieved 14 Sept 2010, from http://www.facebook.com/press/info.php?statistics
    • (2010) Facebook Statistics.
  • 10
    • 84869135645 scopus 로고    scopus 로고
    • Execs Worry That Facebook, Twitter Use Could Lead to Data Leaks
    • Retrieved 2 June 2010, from
    • Gaudin, S. 2009. "Execs Worry That Facebook, Twitter Use Could Lead to Data Leaks. " ComputerWorld Retrieved 2 June 2010, from http://www.computerworld.com/s/article/9136465/Execs_worry_that_Facebook_Twitter_use_could_lead_to_ data_leaks
    • (2009) ComputerWorld
    • Gaudin, S.1
  • 11
    • 33749016498 scopus 로고    scopus 로고
    • Information Revelation and Privacy in Online Social Networks (the Facebook Case)
    • 2005, Virginia, USA: ACM
    • Gross, R., and Acquisti, A. 2005. "Information Revelation and Privacy in Online Social Networks (the Facebook Case), " ACM Workshop on Privacy in the Electronic Society (WPES)2005, Virginia, USA: ACM.
    • (2005) ACM Workshop on Privacy in the Electronic Society (WPES)
    • Gross, R.1    Acquisti, A.2
  • 12
    • 67650152666 scopus 로고    scopus 로고
    • Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
    • Herath, T., and Rao, H. 2009. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations, " European Journal of Information Systems (18), pp 106-125.
    • (2009) European Journal of Information Systems , vol.18 , pp. 106-125
    • Herath, T.1    Rao, H.2
  • 13
    • 57649090183 scopus 로고    scopus 로고
    • Information Security Management Standards: Compliance, Governance and Risk Management
    • Humphreys, E. 2008. "Information Security Management Standards: Compliance, Governance and Risk Management, " Information Security Technical Report (13:4), pp 247-255.
    • (2008) Information Security Technical Report , vol.13 , Issue.4 , pp. 247-255
    • Humphreys, E.1
  • 14
    • 84869102395 scopus 로고    scopus 로고
    • Information Leakage
    • ISF., Retrieved 19 November 2009, from
    • ISF. 2007. "Information Leakage. " Information Security Forum Briefing No.4 Retrieved 19 November 2009, from www.securityforum.org
    • (2007) Information Security Forum Briefing No.4
  • 15
    • 84869135644 scopus 로고    scopus 로고
    • Information Technology-Security Techniques-Code of Practice for Information Security Management
    • ISO/IEC., Geneva, Switzerland: ISO/IEC
    • ISO/IEC. 2005. "Information Technology-Security Techniques-Code of Practice for Information Security Management, " in: ISO/IEC 17799:2005(E). Geneva, Switzerland: ISO/IEC.
    • (2005) ISO/IEC 17799:2005(E)
  • 17
    • 77953551557 scopus 로고    scopus 로고
    • Strategic Information Disclosure and Competition for an Omperfictly Protected Innovation
    • Jansen, J. 2010. "Strategic Information Disclosure and Competition for an Omperfictly Protected Innovation, " The Journal of Industrial Economics (58:2), pp 349-372.
    • (2010) The Journal of Industrial Economics , vol.58 , Issue.2 , pp. 349-372
    • Jansen, J.1
  • 18
    • 0000133760 scopus 로고
    • Threats to Information Systems: Today's Reality, Yesterday's Understanding
    • Loch, K.D., Carr, H.H., and Warkentin, M.E. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding, " MIS Quarterly (16:2), pp 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 20
    • 73149085290 scopus 로고    scopus 로고
    • Awareness Training 2.0
    • pp. 18-21
    • McKenna, B. 2009. "Awareness Training 2.0, " in: InfoSecurity. pp. 18-21.
    • (2009) InfoSecurity
    • McKenna, B.1
  • 22
    • 67650143327 scopus 로고    scopus 로고
    • What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study
    • Myyry, L., Siponen, M., Pahnila, S., Vartiaine, T., and Vance, A. 2009. "What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study, " European Journal of Information Systems (18), pp 126-139.
    • (2009) European Journal of Information Systems , vol.18 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiaine, T.4    Vance, A.5
  • 26
    • 84869125413 scopus 로고    scopus 로고
    • Why Do People Engage in Social Computing? A Need Fulfillment Perspective
    • Texas, U.S.: The University of Texas at Arlington, p. 112
    • Sachdev, V. 2007. "Why Do People Engage in Social Computing? A Need Fulfillment Perspective, " in: Information Systems & Operations Management. Texas, U.S.: The University of Texas at Arlington, p. 112.
    • (2007) Information Systems & Operations Management
    • Sachdev, V.1
  • 27
    • 0000280419 scopus 로고
    • Effective Is Security
    • Straub, D. 1990. "Effective Is Security, " Information Systems Research (1:3), pp 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 28
    • 37249010231 scopus 로고    scopus 로고
    • An Evaluation of Identity Sharing Behavior in Social Network Communities
    • Stutzman, F. 2006. "An Evaluation of Identity Sharing Behavior in Social Network Communities, " International Digital Media and Arts Association (3:1), pp 10-18.
    • (2006) International Digital Media and Arts Association , vol.3 , Issue.1 , pp. 10-18
    • Stutzman, F.1
  • 29
    • 73549120882 scopus 로고
    • Understanding Information Technology Usage: A Test of Competing Models
    • June
    • Taylor, S., and Todd, P. 1995. "Understanding Information Technology Usage: A Test of Competing Models, " Information Systems Research (6:2), June, pp 144-176.
    • (1995) Information Systems Research , vol.6 , Issue.2 , pp. 144-176
    • Taylor, S.1    Todd, P.2
  • 30
    • 24644470542 scopus 로고    scopus 로고
    • The Insider Threat to Information Systems and the Effectiveness of Iso17799
    • Theoharidou, M., Kokolakis, S., Karyda, M., and Kiountouzis, E. 2005. "The Insider Threat to Information Systems and the Effectiveness of Iso17799, " Computers & Society (24), pp 472-484.
    • (2005) Computers & Society , vol.24 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 32
    • 0030554013 scopus 로고    scopus 로고
    • Misbehavior in Organizations: A Motivational Framework
    • Vardi, Y., and Wiener, Y. 1996. "Misbehavior in Organizations: A Motivational Framework, " Organization Science (7:2), pp 151-165.
    • (1996) Organization Science , vol.7 , Issue.2 , pp. 151-165
    • Vardi, Y.1    Wiener, Y.2
  • 33
    • 2342475711 scopus 로고    scopus 로고
    • Towards Information Security Behavioural Compliance
    • Vroom, C., and von Solms, R. 2004. "Towards Information Security Behavioural Compliance, " Computers & Security (23), pp 191-198.
    • (2004) Computers & Security , vol.23 , pp. 191-198
    • Vroom, C.1    von Solms, R.2
  • 34
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and Policy Issues in Information Systems Security: The Insider Threat
    • Warkentin, M., and Willison, R. 2009. "Behavioral and Policy Issues in Information Systems Security: The Insider Threat, " European Journal of Information Systems (18), pp 101-105.
    • (2009) European Journal of Information Systems , vol.18 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 37
    • 51349158689 scopus 로고    scopus 로고
    • Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test
    • Workman, M., Bommer, W., and Straub, D. 2008. "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test, " Computers in Human Behavior (24), pp 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.2    Straub, D.3
  • 39
    • 77956190283 scopus 로고    scopus 로고
    • Policies and Procedures to Manage Employee Internet Abuse
    • Young, K. 2010. "Policies and Procedures to Manage Employee Internet Abuse, " Computers in Human Behavior (26), pp 1467-1471.
    • (2010) Computers in Human Behavior , vol.26 , pp. 1467-1471
    • Young, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.