메뉴 건너뛰기




Volumn 105, Issue , 2010, Pages 47-55

Information security culture: A behaviour compliance conceptual framework

Author keywords

Conceptual framework; Information security behaviour and compliance; Information security culture; Information security management

Indexed keywords

COMPLEX DYNAMICS; CONCEPTUAL FRAMEWORKS; DEPARTMENT MANAGERS; EXPLORATORY STUDIES; HUMAN BEHAVIOURS; INDIVIDUAL PREFERENCE; INFORMATION SECURITY MANAGEMENTS; INFORMATION SECURITY PRACTICE; IT STAFF; ORGANISATIONAL CULTURE; SAUDI ARABIA; SENIOR MANAGERS; SOCIAL ENVIRONMENT; SOCIAL WORK; THEORETICAL MODELS;

EID: 84871230507     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Article
Times cited : (54)

References (26)
  • 3
    • 0035063716 scopus 로고    scopus 로고
    • Violation of safeguards by trusted personnel and understanding related information security concerns
    • Dhillon, G. (2001). Violation of safeguards by trusted personnel and understanding related information security concerns. Computers & Security, 20:165-172.
    • (2001) Computers & Security , vol.20 , pp. 165-172
    • Dhillon, G.1
  • 5
    • 33744830087 scopus 로고    scopus 로고
    • Valuefocused assessment of information system security in organizations
    • Dhillon, G. and Torkzadeh (2006). Valuefocused assessment of information system security in organizations. Information Systems Journal, 16:293-314.
    • (2006) Information Systems Journal , vol.16 , pp. 293-314
    • Torkzadeh, D.G.1
  • 7
    • 0000418866 scopus 로고
    • The utility analysis of choices involving risk
    • Friedman, M. and Savage, L. (1948). The utility analysis of choices involving risk. Journal of Political Economy, 56:279-304.
    • (1948) Journal of Political Economy , vol.56 , pp. 279-304
    • Friedman, M.1    Savage, L.2
  • 9
    • 0030262974 scopus 로고    scopus 로고
    • An information model based on classication theory
    • Parsons, J. (1996). An information model based on classication theory. Management Science, 42(10):1437-1453.
    • (1996) Management Science , vol.42 , Issue.10 , pp. 1437-1453
    • Parsons, J.1
  • 11
    • 33846849570 scopus 로고    scopus 로고
    • Organisational security culture: Extending the enduser perspective
    • Ruighaver, A., Maynard, S., and Chang, S. (2007). Organisational security culture: Extending the enduser perspective. Computers & Security, 26(1):56-62.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 56-62
    • Ruighaver, A.1    Maynard, S.2    Chang, S.3
  • 12
    • 78650874414 scopus 로고    scopus 로고
    • Information security culture the sociocultural dimension in information security management
    • Cairo, Egypt; 7-9 May 2002
    • Schlienger, T. and Teufel, S. (2002.). Information security culture the sociocultural dimension in information security management. FIP TC11 international conference on information security, Cairo, Egypt; 7-9 May 2002.
    • (2002) FIP TC11 international conference on information security
    • Schlienger, T.1    Teufel, S.2
  • 13
    • 84942754786 scopus 로고    scopus 로고
    • Analyzing information security culture: increased trust by an appropriate information security culture
    • Proceedings. 14th International Workshop on
    • Schlienger, T. and Teufel, S. (2003). Analyzing information security culture: increased trust by an appropriate information security culture. Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on, pages 405-409.
    • (2003) Database and Expert Systems Applications, 2003 , pp. 405-409
    • Schlienger, T.1    Teufel, S.2
  • 14
    • 8744290801 scopus 로고    scopus 로고
    • Critical analysis of different approaches to minimizing userrelated faults in information systems security: implications for research and practice
    • Siponen, M. (2000). Critical analysis of different approaches to minimizing userrelated faults in information systems security: implications for research and practice. Information Management & Computer Security, 8(5):197-209.
    • (2000) Information Management & Computer Security , vol.8 , Issue.5 , pp. 197-209
    • Siponen, M.1
  • 15
    • 85019433170 scopus 로고    scopus 로고
    • A review of information security issues and respective research contributions
    • Siponen, M. and Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. SIGMIS Database, 38(1):60-80.
    • (2007) SIGMIS Database , vol.38 , Issue.1 , pp. 60-80
    • Siponen, M.1    Oinas-Kukkonen, H.2
  • 16
    • 0003806186 scopus 로고
    • Harvard University Press, Cambridge, MA
    • Smith, E. and Medin, D. (1981). Categoriesa nd Concepts. Harvard University Press, Cambridge, MA. Stanton, M., Stam, R., Mastrangelo, P., and Jolton,.
    • (1981) Categoriesa nd Concepts
    • Smith, E.1    Medin, D.2
  • 18
    • 84871193075 scopus 로고    scopus 로고
    • Trust, trustworthiness, and the behavioral foundations of corporate law
    • Stout, L., Blair, and Margaret, M. (2001). Trust, trustworthiness, and the behavioral foundations of corporate law. SSRN eLibrary.
    • (2001) SSRN eLibrary
    • Stout, L.1    Margaret, M.B.2
  • 19
    • 0141463342 scopus 로고
    • Deterring cheating by student programmers: A eld experiment in computer security
    • Straub, D. W., Carlson, P. J., and Jones, E. H. (1993). Deterring cheating by student programmers: A eld experiment in computer security. Journal of Management Systems, 5:33-48.
    • (1993) Journal of Management Systems , vol.5 , pp. 33-48
    • Straub, D.W.1    Carlson, P.J.2    Jones, E.H.3
  • 20
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organizations: A eld study
    • Straub, D. W. and Nance, W. D. (1990). Discovering and disciplining computer abuse in organizations: A eld study. MIS Quarterly, 14:45-62.
    • (1990) MIS Quarterly , vol.14 , pp. 45-62
    • Straub, D.W.1    Nance, W.D.2
  • 21
    • 34547155502 scopus 로고    scopus 로고
    • Armed, and dangerous (?): Motivating rule adherence among agents of social control
    • Tyler, T., Patrick, C., and Jeffrey, F. (2007). Armed, and dangerous (?): Motivating rule adherence among agents of social control. Law & Society Review.
    • (2007) Law & Society Review
    • Tyler, T.1    Patrick, C.2    Jeffrey, F.3
  • 22
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management. Computers and security
    • von Solms, B. and von Solms, R. (2004). The 10 deadly sins of information security management. computers and security. Computers and Security, 23:371-376.
    • (2004) Computers and Security , vol.23 , pp. 371-376
    • Solms, B.V.1    Solms, R.V.2
  • 23
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioral compliance
    • Vroom, C. and von Solms, R. (2004). Towards information security behavioral compliance. Computers & Security, 23(3):191-198.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Solms, R.V.2
  • 24
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M., Bommer, W. H., and Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24:2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 25
    • 84871256586 scopus 로고    scopus 로고
    • Understanding challenges of information security culture: a methodological issue
    • Perth, Australia; 26 November 2004
    • Zakaria (2004). Understanding challenges of information security culture: a methodological issue. In the second Australian information security management conference, Perth, Australia; 26 November 2004.
    • (2004) The second Australian information security management conference
    • Zakaria1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.