메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2978-2987

Employees' information security awareness and behavior: A literature review

Author keywords

[No Author keywords available]

Indexed keywords

AWARENESS AND BEHAVIORS; BEHAVIORAL FACTORS; BEHAVIORAL THEORY; INFORMATION SECURITY AWARENESS; LITERATURE REVIEWS; SECURITY AWARENESS; SECURITY RESEARCH; WEAKEST LINKS;

EID: 84875493546     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2013.192     Document Type: Conference Paper
Times cited : (78)

References (40)
  • 4
    • 77957077814 scopus 로고    scopus 로고
    • Practicing Safe Computing: A multimethod empirical examination of home computer user behavioral intentions
    • 2010
    • C.L. Anderson, and R. Agarwal, "Practicing Safe Computing: A multimethod empirical examination of home computer user behavioral intentions", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 613-643, 2010.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 7
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • B. Bulgurcu, H. Cavusoglu, I. Benbasat, "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness", MIS Quarterly, Vol. 34, pp. 523-548, 2010.
    • (2010) MIS Quarterly , vol.34 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 9
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security in the workplace: Linking information security climate to compliant behavior
    • M. Chan, I. Woon A. Kankanhalli, "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior", Journal of Information Privacy Security, Vol. 1, pp. 18-41, 2005.
    • (2005) Journal of Information Privacy Security , vol.1 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 10
    • 84936823933 scopus 로고
    • User acceptance of computer technology: A comparison of two theoretical models
    • 1989
    • Davis, F. D., Bagozzi, R. P., and Warshaw, P. R. 1989. "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science, Vol. 35, no. 8, pp. 982-1003, 1989.
    • (1989) Management Science , vol.35 , Issue.8 , pp. 982-1003
    • Davis, F.D.1    Bagozzi, R.P.2    Warshaw, P.R.3
  • 11
    • 67349280492 scopus 로고    scopus 로고
    • Does one size fit all? Examining the differential effects of is security countermeasures
    • J. D'Arcy, A. Hovav, "Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures", Journal of Business Ethics, Vol. 89, pp. 59-71, 2009.
    • (2009) Journal of Business Ethics , vol.89 , pp. 59-71
    • D'arcy, J.1    Hovav, A.2
  • 12
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • J. D'Arcy, A. Hovav, D. Galletta, "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach", Information Systems Research, Vol. 20, No. 1, pp. 79-98, 2009.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'arcy, J.1    Hovav, A.2    Galletta, D.3
  • 14
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organizations
    • T. Herath, H.R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organizations", European Journal on Information Systems, Vol. 18, No. 2, pp. 106-125, 2009
    • (2009) European Journal on Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 15
    • 80052902327 scopus 로고    scopus 로고
    • Toward a new meta-theory for designing information systems (IS) security training approaches
    • M. Karjalainen, M.T. Siponen, "Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches", Journal of the Association for Information Systems (JAIS), Vol. 12, pp. 518-555, 2011.
    • (2011) Journal of the Association for Information Systems (JAIS) , vol.12 , pp. 518-555
    • Karjalainen, M.1    Siponen, M.T.2
  • 16
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • 2004
    • A.G. Kotulic, and J.G. Clark, "Why there aren't more information security research studies", Information & Management, Vol. 41, 2004, pp. 597-607, 2004.
    • (2004) Information & Management , vol.41 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 17
    • 0242521674 scopus 로고    scopus 로고
    • Grounding a new information technology implementation framework in behavioral science: A systematic analysis of the literature on IT use
    • R. Kukafka, S.B. Johnson, A. Linfante, J.P. Allegrantec, "Grounding a new information technology implementation framework in behavioral science: a systematic analysis of the literature on IT use", Journal of Biomedical Informatics, Vol. 36, pp. 218-227, 2003.
    • (2003) Journal of Biomedical Informatics , vol.36 , pp. 218-227
    • Kukafka, R.1    Johnson, S.B.2    Linfante, A.3    Allegrantec, J.P.4
  • 19
  • 23
    • 84970235764 scopus 로고
    • Self-reports in organizational research: Problems and prospects
    • P.M. Podsakoff, D. Organ, "Self-reports in organizational research: Problems and prospects", Journal of Management, Vol. 12 No. 4, pp. 531-544, 1986.
    • (1986) Journal of Management , vol.12 , Issue.4 , pp. 531-544
    • Podsakoff, P.M.1    Organ, D.2
  • 24
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation theory
    • Guilford, New York
    • R.W. Rogers, "Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation Theory", in Social Psychophysiology, J. Cacioppo and R. Petty (Eds.), Guilford, New York, 1983.
    • (1983) Social Psychophysiology, J. Cacioppo and R. Petty (Eds.)
    • Rogers, R.W.1
  • 25
    • 40749085237 scopus 로고    scopus 로고
    • Toward improving the relevance of information systems research to practice: The role of applicability checks
    • M. Rosemann, I. Vessey, "Toward Improving the Relevance of Information Systems Research to Practice: The Role of Applicability Checks" MIS Quarterly, Vol. 32, No. 1, 2008.
    • (2008) MIS Quarterly , vol.32 , Issue.1
    • Rosemann, M.1    Vessey, I.2
  • 26
    • 77957070672 scopus 로고    scopus 로고
    • User participation in information systems security risk management
    • J.L. Spears, H. Barki, "User Participation in Information Systems Security Risk Management", MIS Quarterly, Vol. 34, No. 3, pp. 503-522, 2010
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 503-522
    • Spears, J.L.1    Barki, H.2
  • 27
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • D.W. Straub, "Effective IS security: An empirical study", Information Systems Research, Vol. 1, No. 3, pp. 255-276, 1990.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 28
    • 1542382496 scopus 로고    scopus 로고
    • User acceptance of information technology: Toward a unified view
    • V. Venkatesh, M.G. Morris, G.B. Davis, F.D. Davis, "User Acceptance of Information Technology: Toward a Unified View", MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003.
    • (2003) MIS Quarterly , vol.27 , Issue.3 , pp. 425-478
    • Venkatesh, V.1    Morris, M.G.2    Davis, G.B.3    Davis, F.D.4
  • 29
    • 8744290801 scopus 로고    scopus 로고
    • Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice
    • M.T. Siponen, "Critical analysis of different approaches to minimizing user-related faults in information systems security: implications for research and practice", Information Management & Computer Security, Vol. 8, pp. 197-209, 2000.
    • (2000) Information Management & Computer Security , vol.8 , pp. 197-209
    • Siponen, M.T.1
  • 31
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee systems security policy violations
    • M.T. Siponen, A. Osborn Vance, "Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations", MIS Quarterly, Vol. 34 No. 3, pp. 487-502, 2010.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.T.1    Osborn Vance, A.2
  • 32
    • 34548066397 scopus 로고    scopus 로고
    • How low should you go? Low response rates and the validity of inference in IS questionnaire research
    • S. Sivo, S. Saunders, Q. Chang, and J.J. Jiang, "How low should you go? Low response rates and the validity of inference in IS questionnaire research", Journal of the Association for Information Systems, Vol. 7, No. 6, pp. 351-414, 2004.
    • (2004) Journal of the Association for Information Systems , vol.7 , Issue.6 , pp. 351-414
    • Sivo, S.1    Saunders, S.2    Chang, Q.3    Jiang, J.J.4
  • 33
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioral compliance
    • C. Vroom, and R. von Solms, "Towards information security behavioral compliance", Computer & Security, Vol. 23, No. 3, pp. 191-198, 2004.
    • (2004) Computer & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 35
    • 0035546509 scopus 로고    scopus 로고
    • Forums for information systems scholars: III
    • K.A. Walstrom, B.V. Hardgrave, "Forums for Information Systems Scholars: III", Infromation & Management, Vol.39, pp. 117-124, 2001.
    • (2001) Infromation & Management , vol.39 , pp. 117-124
    • Walstrom, K.A.1    Hardgrave, B.V.2
  • 36
    • 33645110997 scopus 로고    scopus 로고
    • Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence
    • T.L. Webb, P Sheeran, "Does Changing Behavioral Intentions Engender Behavior Change? A Meta-Analysis of the Experimental Evidence", Psychological Bulletin, Vol. 132, No. 2, pp. 249-268, 2006.
    • (2006) Psychological Bulletin , vol.132 , Issue.2 , pp. 249-268
    • Webb, T.L.1    Sheeran, P.2
  • 37
    • 0012903874 scopus 로고    scopus 로고
    • Analyzing the past to prepare for the future: Writing a literature review
    • J. Webster, R.T. Watson, "Analyzing the Past to Prepare for the Future: Writing a Literature Review", MIS Quarterly, Vol. 26, pp. xiii-xxiii, 2002.
    • (2002) MIS Quarterly , vol.26
    • Webster, J.1    Watson, R.T.2
  • 39
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • M. Workman, W.H. Bommer, D. Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test", Computers in Human Behavior, Vol. 24, pp. 2799-2816, 2008.
    • (2008) Computers in Human Behavior , vol.24 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.