메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Enabling information security culture: Influences and challenges for Australian SMEs

Author keywords

Information security; Information security culture; Small and Medium Size enterprises

Indexed keywords

INTERPRETIVE STUDY; SMALL AND MEDIUM-SIZE ENTERPRISE;

EID: 84870387829     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (36)
  • 1
    • 67649708310 scopus 로고    scopus 로고
    • The information security digital divide between information security managers and users
    • Albrechtsen, E. and Hovden, J. 2009. "The information security digital divide between information security managers and users" Computers & Security (28:6), pp 476-490.
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 476-490
    • Albrechtsen, E.1    Hovden, J.2
  • 2
    • 78650904382 scopus 로고    scopus 로고
    • ABS (Australian Bureau of Statistics)
    • ABS (Australian Bureau of Statistics). 2001. 1321.0-Small Business in Australia.
    • (2001) 1321.0-Small Business in Australia
  • 5
    • 2342598277 scopus 로고    scopus 로고
    • Computer Security Impaired by Legitimate Users
    • Besnard, D. and Arief, B. 2004. "Computer Security Impaired by Legitimate Users" Computers & Security (23:1), pp 253-264.
    • (2004) Computers & Security , vol.23 , Issue.1 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 6
    • 78049400376 scopus 로고    scopus 로고
    • BIS (2008), Department of Business, Innovation and Skills, UK
    • BIS (2008) 2008 Information Security Breaches, Department of Business, Innovation and Skills, UK.
    • (2008) Information Security Breaches
  • 7
    • 84864555061 scopus 로고    scopus 로고
    • Exploring Organisational Security Culture: Developing A Comprehensive Research Model
    • Las Vegas, USA
    • Chia, P.A., Maynard, S.B. and Ruighaver, A.B. 2002. "Exploring Organisational Security Culture: Developing A Comprehensive Research Model" Proceedings of IS ONE World Conference, Las Vegas, USA.
    • (2002) Proceedings of IS ONE World Conference
    • Chia, P.A.1    Maynard, S.B.2    Ruighaver, A.B.3
  • 8
    • 67649551429 scopus 로고    scopus 로고
    • User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
    • D'Arcy, J., Hovav, A. and Galletta, D.F. 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach" Information Systems Research (20:1), pp 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.F.3
  • 13
    • 33749667570 scopus 로고    scopus 로고
    • An Empirical Investigation of Antecedents of Internet Abuse in the Workplace
    • Seattle, USA
    • Galletta, D.F. and Polak, P. 2003. "An Empirical Investigation of Antecedents of Internet Abuse in the Workplace". Proceedings of AIS SIG-HCI Workshop. Seattle, USA.
    • (2003) Proceedings of AIS SIG-HCI Workshop.
    • Galletta, D.F.1    Polak, P.2
  • 14
    • 15744404682 scopus 로고    scopus 로고
    • Management of risk in the information age
    • Gerber, M. and von Solms, R. 2005. "Management of risk in the information age" Computers & Security (24:1), pp 16-30.
    • (2005) Computers & Security , vol.24 , Issue.1 , pp. 16-30
    • Gerber, M.1    von Solms, R.2
  • 15
    • 24144453387 scopus 로고    scopus 로고
    • Information systems security issues and decisions for small businesses
    • Gupta, A. and Hammond, R. 2005. "Information systems security issues and decisions for small businesses" Information Management & Computer Security (13:4), pp 297-310.
    • (2005) Information Management & Computer Security , vol.13 , Issue.4 , pp. 297-310
    • Gupta, A.1    Hammond, R.2
  • 18
    • 0002390117 scopus 로고
    • Cultural constraints in management theories
    • Hofstede, G. 1991. "Cultural constraints in management theories" The Executive (7:1), pp 81-94.
    • (1991) The Executive , vol.7 , Issue.1 , pp. 81-94
    • Hofstede, G.1
  • 19
    • 33750513188 scopus 로고    scopus 로고
    • Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    • Kraemer, S. and Carayon, P. 2007. "Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists" Applied Ergonomics (38), pp 143-154.
    • (2007) Applied Ergonomics , vol.38 , pp. 143-154
    • Kraemer, S.1    Carayon, P.2
  • 21
    • 67650166189 scopus 로고    scopus 로고
    • Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
    • Lee, Y. and Larson, K.R. 2009. "Threat or coping appraisal: determinants of SMB executives' decision to adopt anti-malware software" European Journal of Information Systems (18), pp 177-187.
    • (2009) European Journal of Information Systems , vol.18 , pp. 177-187
    • Lee, Y.1    Larson, K.R.2
  • 24
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Myyry, L., Siponen, M., Pahnila, S., Vertianen, T. and Vance, A. 2009. "What levels of moral reasoning and values explain adherence to information security rules? An empirical study European Journal of Information Systems (18), pp 126-139.
    • (2009) European Journal of Information Systems , vol.18 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vertianen, T.4    Vance, A.5
  • 25
    • 73149093371 scopus 로고    scopus 로고
    • ICT business management for SMEs
    • December 11. PWC (Price Waterhouse Coopers). 2008. "Safeguarding the New Currency of Business" Price Waterhouse Coopers
    • O'Halloran, J. (2003), "ICT business management for SMEs" Computer Weekly, December 11. PWC (Price Waterhouse Coopers). 2008. "Safeguarding the New Currency of Business" Price Waterhouse Coopers.
    • (2003) Computer Weekly
    • O'Halloran, J.1
  • 29
    • 84869118395 scopus 로고    scopus 로고
    • Symantec, Computerworld, Retrieved 12th May, 2010, from
    • Symantec. 2009. "2009 Global Small and Mid-sized Business (SMB) Security and Storage survey" Computerworld, Retrieved 12th May, 2010, from http://www.computerworld.com.au/article/302806/symantec_survey_reveals_more_than_half_small_midsize d_businesses_australia_new_zealand_experience
    • (2009) 2009 Global Small and Mid-sized Business (SMB) Security and Storage survey
  • 30
    • 33750923703 scopus 로고    scopus 로고
    • Cultivating an organizational information security culture
    • Thomson, K., Von Solms, R. and Louw, L. 2006. "Cultivating an organizational information security culture" Computers Fraud & Security (10), pp 7-11.
    • (2006) Computers Fraud & Security , vol.10 , pp. 7-11
    • Thomson, K.1    von Solms, R.2    Louw, L.3
  • 31
    • 84937310044 scopus 로고
    • The influence of national culture on organizational culture: A comparative study between 10 countries
    • Van Muijen, J.J. and Koopman, P.L. 1994. "The influence of national culture on organizational culture: A comparative study between 10 countries" European Journal of Work and Organizational Psychology (4:4), pp 367-380.
    • (1994) European Journal of Work and Organizational Psychology , vol.4 , Issue.4 , pp. 367-380
    • van Muijen, J.J.1    Koopman, P.L.2
  • 33
    • 0001440837 scopus 로고
    • The effects of culture on ethical decision-making: An application of Hofstede's typology
    • Vitell, S. J., Nwachukwu, S. L., and Barnes, J. H. 1993. "The effects of culture on ethical decision-making: An application of Hofstede's typology" Journal of Business Ethics (12), pp 753-760.
    • (1993) Journal of Business Ethics , vol.12 , pp. 753-760
    • Vitell, S.J.1    Nwachukwu, S.L.2    Barnes, J.H.3
  • 34
    • 73549100231 scopus 로고
    • The Emergence of Interpretivism in IS Research
    • Walsham, G. 1995. "The Emergence of Interpretivism in IS Research" Information Systems Research, (6:4), pp. 376-394.
    • (1995) Information Systems Research , vol.6 , Issue.4 , pp. 376-394
    • Walsham, G.1
  • 35
    • 84868012356 scopus 로고    scopus 로고
    • Integrating organizational, social, and individual perspectives in Web 2.0-based workplace elearning
    • Wang, M. 2009. "Integrating organizational, social, and individual perspectives in Web 2.0-based workplace elearning" Information Systems Frontiers (9:4), pp 343-358.
    • (2009) Information Systems Frontiers , vol.9 , Issue.4 , pp. 343-358
    • Wang, M.1
  • 36
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: The insider threat
    • Warkentin, M., and Willison, R. 2009. "Behavioral and policy issues in information systems security: The insider threat" European Journal of Information Systems (18), pp 101-105.
    • (2009) European Journal of Information Systems , vol.18 , pp. 101-105
    • Warkentin, M.1    Willison, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.