메뉴 건너뛰기




Volumn 21, Issue 6, 2012, Pages 328-345

How Effective Is Your Security Awareness Program? An Evaluation Methodology

Author keywords

evaluation methodology; security awareness; security management

Indexed keywords

AWARENESS PROGRAM; CORRECTIVE ACTIONS; EVALUATION METHODOLOGIES; EVALUATION PROGRAM; HIGHER MANAGEMENT; SECURITY AWARENESS; SECURITY INFRASTRUCTURE; SECURITY MANAGEMENT; USERS' PERCEPTION;

EID: 84871904550     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393555.2012.747234     Document Type: Article
Times cited : (37)

References (30)
  • 1
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Albrechtsen, E. 2007. A qualitative study of users' view on information security. Computers & Security, 26(4), 276--289.,
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 2
    • 84869480515 scopus 로고    scopus 로고
    • Effectiveness of information security awareness methods based on psychological theories
    • Bilal Khan, K. S. 2011. Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management, 5(26): 10862-10868.
    • (2011) African Journal of Business Management , vol.5 , Issue.26 , pp. 10862-10868
    • Bilal Khan, K.S.1
  • 6
    • 84871900643 scopus 로고    scopus 로고
    • Deloitte
    • Deloitte. (2010). Global Security Survey. www.deloitte.com (http://www.deloitte.com)
    • (2010) Global Security Survey
  • 7
    • 84871878428 scopus 로고    scopus 로고
    • Deloitte
    • Deloitte. (2011). Global Security Survey. www.deloitte.com (http://www.deloitte.com)
    • (2011) Global Security Survey
  • 8
    • 33846794868 scopus 로고    scopus 로고
    • Phishing for user security awareness
    • Dodge, R., Carver, C. and Ferguson, A. 2007. Phishing for user security awareness. Computers & Security, 26(1): 73-80.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 73-80
    • Dodge, R.1    Carver, C.2    Ferguson, A.3
  • 9
    • 77956620263 scopus 로고    scopus 로고
    • The positive outcomes of information security awareness training in companies - a case study
    • Eminaǧaoǧlu, M. U. 2010. The positive outcomes of information security awareness training in companies-a case study. Information Security Technical Report,: 223-229.
    • (2010) Information Security Technical Report , pp. 223-229
    • Eminaǧaoǧlu, M.U.1
  • 10
    • 84871903984 scopus 로고    scopus 로고
    • European Network and Information Security Agency (ENISA)
    • European Network and Information Security Agency (ENISA). (2010). The new users' guide-how to raise InfoSec awareness. http://enisa.europa.eu (http://enisa.europa.eu)
    • (2010) The new users' guide - how to raise InfoSec awareness
  • 11
    • 72949110069 scopus 로고    scopus 로고
    • European Network and Information Security Agency (ENISA), PricewaterhouseCoopers LLP (PwC), Availale from
    • European Network and Information Security Agency (ENISA), PricewaterhouseCoopers LLP (PwC). (2007). Information security awareness initiatives: Current practice and the measurement of success.Availale from http://www.enisa.europa.eu (http://www.enisa.europa.eu)
    • (2007) Information security awareness initiatives: Current practice and the measurement of success
  • 13
    • 79960754088 scopus 로고    scopus 로고
    • The long-term effects of information security e-learning on organizational learning
    • Janne Hagen, E. A. 2011. The long-term effects of information security e-learning on organizational learning. Information Management & Computer Security, 19(3): 140-154.
    • (2011) Information Management & Computer Security , vol.19 , Issue.3 , pp. 140-154
    • Janne Hagen, E.A.1
  • 14
    • 54949146918 scopus 로고    scopus 로고
    • Implementation and effectiveness of organizational information security measures
    • Janne Merete Hagen, E. A. 2008. Implementation and effectiveness of organizational information security measures. Information Management & Computer Security, 16(4): 377-397.
    • (2008) Information Management & Computer Security , vol.16 , Issue.4 , pp. 377-397
    • Janne Merete Hagen, E.A.1
  • 15
    • 76649144189 scopus 로고    scopus 로고
    • Effects on employees' information security abilities by e-learning
    • Janne Merete Hagen, E. A. 2009. Effects on employees' information security abilities by e-learning. Information Management & Computer Security, 17(5): 388-407.
    • (2009) Information Management & Computer Security , vol.17 , Issue.5 , pp. 388-407
    • Janne Merete Hagen, E.A.1
  • 16
    • 33644755338 scopus 로고    scopus 로고
    • Security awareness: Switch to a better programme
    • Johnson, E. C. 2006. Security awareness: Switch to a better programme. Network Security, 2: 15-18.
    • (2006) Network Security , vol.2 , pp. 15-18
    • Johnson, E.C.1
  • 17
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • Kruger, H. 2006. A prototype for assessing information security awareness. Computers Security, 25(4): 289-296.
    • (2006) Computers Security , vol.25 , Issue.4 , pp. 289-296
    • Kruger, H.1
  • 24
    • 84884728299 scopus 로고    scopus 로고
    • Process approach to information security metrics in Finnish industry and state institutions
    • Sademies, A. 2004. Process approach to information security metrics in Finnish industry and state institutions. VTT Publications, Finland,
    • (2004) VTT Publications, Finland
    • Sademies, A.1
  • 25
    • 47849117993 scopus 로고    scopus 로고
    • SANS Institute
    • SANS Institute. (2006). A guide to security metrics. http://www.sans.org/ (http://www.sans.org/)
    • (2006) A guide to security metrics
  • 28
    • 1242263792 scopus 로고    scopus 로고
    • Security training and awareness-fitting a square peg in a round hole
    • Schultz, E. 2004. Security training and awareness-fitting a square peg in a round hole. Computers Security, 23: 1-2.
    • (2004) Computers Security , vol.23 , pp. 1-2
    • Schultz, E.1
  • 29
    • 84871865951 scopus 로고    scopus 로고
    • TELUS-Rotman
    • TELUS-Rotman. (2011). Joint study on Canadian IT security practices. http://www.rotman.utoronto.ca/securitystudy/ (http://www.rotman.utoronto.ca/securitystudy/)
    • (2011) Joint study on Canadian IT security practices
  • 30
    • 84942754786 scopus 로고    scopus 로고
    • Analyzing information security culture: Increased trust by an appropriate information security culture
    • Teufel, T. S. 2003. Analyzing information security culture: Increased trust by an appropriate information security culture. Proceedings DEXA Workshops,: 405-409.
    • (2003) Proceedings DEXA Workshops , pp. 405-409
    • Teufel, T.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.