-
1
-
-
34249279137
-
An Information-Centric Approach to Data Security in Organizations
-
Ahmad, A., Ruighaver, A.B., and Teo, W.T. 2005. "An Information-Centric Approach to Data Security in Organizations, " TENCON 2005 2005 IEEE Region 10, pp. 1-5.
-
(2005)
TENCON 2005 2005 IEEE Region
, vol.10
, pp. 1-5
-
-
Ahmad, A.1
Ruighaver, A.B.2
Teo, W.T.3
-
3
-
-
57649097311
-
Information Security Management: A Human Challenge?
-
Ashenden, D. 2008. "Information Security Management: A Human Challenge?, " Information Security Technical Report (13:4), pp 195-201.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 195-201
-
-
Ashenden, D.1
-
4
-
-
77950128950
-
Antisocial Networks: Turning a Social Network into a Botnet
-
Taipei, Taiwan
-
Athanasopoulos, E., Makridakis, A., Antonatos, S., Ioannidis, S., Anagnostakis, K., and Markatos, E. 2008. "Antisocial Networks: Turning a Social Network into a Botnet, " 11th Information Security Conference (ISC 2008), Taipei, Taiwan.
-
(2008)
11th Information Security Conference (ISC 2008)
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
Ioannidis, S.4
Anagnostakis, K.5
Markatos, E.6
-
6
-
-
84869125412
-
Data Leakage Worldwide: Common Risks and Mistakes Employees Make
-
CISCO., San Jose, CA: CISCO Systems Inc
-
CISCO. 2008. "Data Leakage Worldwide: Common Risks and Mistakes Employees Make, " in: CISCO Systems White Paper. San Jose, CA: CISCO Systems Inc.
-
(2008)
CISCO Systems White Paper
-
-
-
7
-
-
84855851700
-
Human Factors in Information Security: The Insider Threat-Who Can You Trust These Days?
-
(in press)
-
Colwill, C. 2010. "Human Factors in Information Security: The Insider Threat-Who Can You Trust These Days?, " Information Security Technical Report (in press).
-
(2010)
Information Security Technical Report
-
-
Colwill, C.1
-
8
-
-
77955356527
-
Social Media: Opportunity or Risk?
-
pp. 8-10
-
Everett, C. 2010. "Social Media: Opportunity or Risk?, " in: Computer Fraud & Security. pp. 8-10.
-
(2010)
Computer Fraud & Security
-
-
Everett, C.1
-
9
-
-
77952944272
-
-
Facebook, Retrieved 14 Sept 2010, from
-
Facebook. 2010. "Facebook Statistics. " Retrieved 14 Sept 2010, from http://www.facebook.com/press/info.php?statistics
-
(2010)
Facebook Statistics.
-
-
-
10
-
-
84869135645
-
Execs Worry That Facebook, Twitter Use Could Lead to Data Leaks
-
Retrieved 2 June 2010, from
-
Gaudin, S. 2009. "Execs Worry That Facebook, Twitter Use Could Lead to Data Leaks. " ComputerWorld Retrieved 2 June 2010, from http://www.computerworld.com/s/article/9136465/Execs_worry_that_Facebook_Twitter_use_could_lead_to_ data_leaks
-
(2009)
ComputerWorld
-
-
Gaudin, S.1
-
11
-
-
33749016498
-
Information Revelation and Privacy in Online Social Networks (the Facebook Case)
-
2005, Virginia, USA: ACM
-
Gross, R., and Acquisti, A. 2005. "Information Revelation and Privacy in Online Social Networks (the Facebook Case), " ACM Workshop on Privacy in the Electronic Society (WPES)2005, Virginia, USA: ACM.
-
(2005)
ACM Workshop on Privacy in the Electronic Society (WPES)
-
-
Gross, R.1
Acquisti, A.2
-
12
-
-
67650152666
-
Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
-
Herath, T., and Rao, H. 2009. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations, " European Journal of Information Systems (18), pp 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 106-125
-
-
Herath, T.1
Rao, H.2
-
13
-
-
57649090183
-
Information Security Management Standards: Compliance, Governance and Risk Management
-
Humphreys, E. 2008. "Information Security Management Standards: Compliance, Governance and Risk Management, " Information Security Technical Report (13:4), pp 247-255.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 247-255
-
-
Humphreys, E.1
-
14
-
-
84869102395
-
Information Leakage
-
ISF., Retrieved 19 November 2009, from
-
ISF. 2007. "Information Leakage. " Information Security Forum Briefing No.4 Retrieved 19 November 2009, from www.securityforum.org
-
(2007)
Information Security Forum Briefing No.4
-
-
-
15
-
-
84869135644
-
Information Technology-Security Techniques-Code of Practice for Information Security Management
-
ISO/IEC., Geneva, Switzerland: ISO/IEC
-
ISO/IEC. 2005. "Information Technology-Security Techniques-Code of Practice for Information Security Management, " in: ISO/IEC 17799:2005(E). Geneva, Switzerland: ISO/IEC.
-
(2005)
ISO/IEC 17799:2005(E)
-
-
-
16
-
-
34848911641
-
Social Phishing
-
Jagatic, T., Johnson, N., Jakobsson, M., and Menczer, F. 2007. "Social Phishing, " Communications of the ACM (20:10), pp 94-100.
-
(2007)
Communications of the ACM
, vol.20
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
17
-
-
77953551557
-
Strategic Information Disclosure and Competition for an Omperfictly Protected Innovation
-
Jansen, J. 2010. "Strategic Information Disclosure and Competition for an Omperfictly Protected Innovation, " The Journal of Industrial Economics (58:2), pp 349-372.
-
(2010)
The Journal of Industrial Economics
, vol.58
, Issue.2
, pp. 349-372
-
-
Jansen, J.1
-
18
-
-
0000133760
-
Threats to Information Systems: Today's Reality, Yesterday's Understanding
-
Loch, K.D., Carr, H.H., and Warkentin, M.E. 1992. "Threats to Information Systems: Today's Reality, Yesterday's Understanding, " MIS Quarterly (16:2), pp 173-186.
-
(1992)
MIS Quarterly
, vol.16
, Issue.2
, pp. 173-186
-
-
Loch, K.D.1
Carr, H.H.2
Warkentin, M.E.3
-
20
-
-
73149085290
-
Awareness Training 2.0
-
pp. 18-21
-
McKenna, B. 2009. "Awareness Training 2.0, " in: InfoSecurity. pp. 18-21.
-
(2009)
InfoSecurity
-
-
McKenna, B.1
-
22
-
-
67650143327
-
What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study
-
Myyry, L., Siponen, M., Pahnila, S., Vartiaine, T., and Vance, A. 2009. "What Levels of Moral Reasoning and Values Explain Adherence to Information Security Rules? An Empirical Study, " European Journal of Information Systems (18), pp 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiaine, T.4
Vance, A.5
-
24
-
-
39749168050
-
Employees' Behavior Towards Is Security Policy Compliance
-
Hawaii: IEEE Computer Society
-
Pahnila, S., Siponen, M., and Mahmood, A. 2007. "Employees' Behavior Towards Is Security Policy Compliance, " 40th International Conference on System Sciences, Hawaii: IEEE Computer Society.
-
(2007)
40th International Conference on System Sciences
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
26
-
-
84869125413
-
Why Do People Engage in Social Computing? A Need Fulfillment Perspective
-
Texas, U.S.: The University of Texas at Arlington, p. 112
-
Sachdev, V. 2007. "Why Do People Engage in Social Computing? A Need Fulfillment Perspective, " in: Information Systems & Operations Management. Texas, U.S.: The University of Texas at Arlington, p. 112.
-
(2007)
Information Systems & Operations Management
-
-
Sachdev, V.1
-
27
-
-
0000280419
-
Effective Is Security
-
Straub, D. 1990. "Effective Is Security, " Information Systems Research (1:3), pp 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
28
-
-
37249010231
-
An Evaluation of Identity Sharing Behavior in Social Network Communities
-
Stutzman, F. 2006. "An Evaluation of Identity Sharing Behavior in Social Network Communities, " International Digital Media and Arts Association (3:1), pp 10-18.
-
(2006)
International Digital Media and Arts Association
, vol.3
, Issue.1
, pp. 10-18
-
-
Stutzman, F.1
-
29
-
-
73549120882
-
Understanding Information Technology Usage: A Test of Competing Models
-
June
-
Taylor, S., and Todd, P. 1995. "Understanding Information Technology Usage: A Test of Competing Models, " Information Systems Research (6:2), June, pp 144-176.
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 144-176
-
-
Taylor, S.1
Todd, P.2
-
30
-
-
24644470542
-
The Insider Threat to Information Systems and the Effectiveness of Iso17799
-
Theoharidou, M., Kokolakis, S., Karyda, M., and Kiountouzis, E. 2005. "The Insider Threat to Information Systems and the Effectiveness of Iso17799, " Computers & Society (24), pp 472-484.
-
(2005)
Computers & Society
, vol.24
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
32
-
-
0030554013
-
Misbehavior in Organizations: A Motivational Framework
-
Vardi, Y., and Wiener, Y. 1996. "Misbehavior in Organizations: A Motivational Framework, " Organization Science (7:2), pp 151-165.
-
(1996)
Organization Science
, vol.7
, Issue.2
, pp. 151-165
-
-
Vardi, Y.1
Wiener, Y.2
-
33
-
-
2342475711
-
Towards Information Security Behavioural Compliance
-
Vroom, C., and von Solms, R. 2004. "Towards Information Security Behavioural Compliance, " Computers & Security (23), pp 191-198.
-
(2004)
Computers & Security
, vol.23
, pp. 191-198
-
-
Vroom, C.1
von Solms, R.2
-
34
-
-
67650170305
-
Behavioral and Policy Issues in Information Systems Security: The Insider Threat
-
Warkentin, M., and Willison, R. 2009. "Behavioral and Policy Issues in Information Systems Security: The Insider Threat, " European Journal of Information Systems (18), pp 101-105.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 101-105
-
-
Warkentin, M.1
Willison, R.2
-
37
-
-
51349158689
-
Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test
-
Workman, M., Bommer, W., and Straub, D. 2008. "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test, " Computers in Human Behavior (24), pp 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.2
Straub, D.3
-
38
-
-
33846344673
-
Punishment and Ethics Deterrents: A Study of Insider Security Contravention
-
Workman, M., and Gathegi, J. 2007. "Punishment and Ethics Deterrents: A Study of Insider Security Contravention, " Journal of the American Society for Information Science and Technology (58:2), pp 212-222.
-
(2007)
Journal of the American Society for Information Science and Technology
, vol.58
, Issue.2
, pp. 212-222
-
-
Workman, M.1
Gathegi, J.2
-
39
-
-
77956190283
-
Policies and Procedures to Manage Employee Internet Abuse
-
Young, K. 2010. "Policies and Procedures to Manage Employee Internet Abuse, " Computers in Human Behavior (26), pp 1467-1471.
-
(2010)
Computers in Human Behavior
, vol.26
, pp. 1467-1471
-
-
Young, K.1
-
40
-
-
70349309259
-
Current State of the Information Security Research in Is
-
Zafar, H., and Clark, J.G. 2009. "Current State of the Information Security Research in Is, " Communications of the Association for Information Systems (24:34), pp 572-596.
-
(2009)
Communications of the Association for Information Systems
, vol.24
, Issue.34
, pp. 572-596
-
-
Zafar, H.1
Clark, J.G.2
|