메뉴 건너뛰기




Volumn 32, Issue , 2013, Pages 90-101

Future directions for behavioral information security research

Author keywords

Behavioral information security; Deviant security behavior; Future research; Information security; Research challenges

Indexed keywords

PERSONAL COMPUTING; SECURITY OF DATA;

EID: 84876570327     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.09.010     Document Type: Article
Times cited : (561)

References (106)
  • 3
    • 84876559418 scopus 로고    scopus 로고
    • Neural correlates of gender differences in distinguishing malware warnings and legitimate websites: A NeuroIS study
    • Provo, UT, USA. IFIP WG 8.11/11.13
    • Anderson B, Hansen J, Vance A, Kirwan B, Eargle D, Hinkle LJ, et al. Neural correlates of gender differences in distinguishing malware warnings and legitimate websites: a NeuroIS study. The Dewald Roode Information Security Workshop. Provo, UT, USA. IFIP WG 8.11/11.13; 2012.
    • (2012) The Dewald Roode Information Security Workshop
    • Anderson, B.1    Hansen, J.2    Vance, A.3    Kirwan, B.4    Eargle, D.5    Hinkle, L.J.6
  • 4
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions
    • Anderson CL, Agarwal R. Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly 2010;34(3): 613-43.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 5
    • 84861098483 scopus 로고    scopus 로고
    • A cluster-based fault-tolerant architecture for stateful firewalls
    • Ayuso PN, Gasca RM, Lefevre LFT-FW. A cluster-based fault-tolerant architecture for stateful firewalls. Computers & Security 2012;31(4):524-39.
    • (2012) Computers & Security , vol.31 , Issue.4 , pp. 524-539
    • Ayuso, P.N.1    Gasca, R.M.2    Lefevre, L.F.T.-F.W.3
  • 7
    • 33646563519 scopus 로고    scopus 로고
    • Hackers profiled - Who are they and what are their motivations?
    • Barber R. Hackers profiled - who are they and what are their motivations? Computer Fraud & Security 2001;2001(2):14-7.
    • (2001) Computer Fraud & Security , vol.2001 , Issue.2 , pp. 14-17
    • Barber, R.1
  • 8
    • 84899252279 scopus 로고    scopus 로고
    • The general theory of crime and computer hacking: Low self-control hackers?
    • Holt TJ, Schell BH, editors Hershey: Information Science Reference
    • Bossler AM, Burruss GW. The general theory of crime and computer hacking: low self-control hackers? In: Holt TJ, Schell BH, editors. Corporate hacking and technology-driven crime: social dynamics and implications. Hershey: Information Science Reference; 2011. p. 38-67.
    • (2011) Corporate Hacking and Technology-driven Crime: Social Dynamics and Implications , pp. 38-67
    • Bossler, A.M.1    Burruss, G.W.2
  • 9
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 2010;34(3): 523-48.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 10
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • Choo K-KR. The cyber threat landscape: challenges and future research directions. Computers & Security 2011;30(8):719-31.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 11
    • 0000204509 scopus 로고
    • Social change and crime rate trends: A routine activity approach
    • Cohen LE, Felson M. Social change and crime rate trends: a routine activity approach. American Sociological Review 1979;44(4):588-608.
    • (1979) American Sociological Review , vol.44 , Issue.4 , pp. 588-608
    • Cohen, L.E.1    Felson, M.2
  • 13
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'Arcy J, Hovav A, Galletta D. User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research 2009;20(1):79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 14
    • 80455178572 scopus 로고    scopus 로고
    • A review and analysis of deterrence theory in the IS security literature: Making sense of the disparate findings
    • D'Arcy J, Herath T. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems 2011;20(6): 643-58.
    • (2011) European Journal of Information Systems , vol.20 , Issue.6 , pp. 643-658
    • D'Arcy, J.1    Herath, T.2
  • 15
    • 34848873123 scopus 로고    scopus 로고
    • Deterring internal information systems misuse
    • DOI 10.1145/1290958.1290971, 1290971
    • D'Arcy J, Hovav A. Deterring internal information systems misuse. Communications of the ACM 2007;50(10):113-7. (Pubitemid 47505008)
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 113-117
    • D'Arcy, J.1    Hovav, A.2
  • 16
    • 77956856870 scopus 로고    scopus 로고
    • What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study
    • Dimoka A. What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Quarterly 2010;34(2):373-96.
    • (2010) MIS Quarterly , vol.34 , Issue.2 , pp. 373-396
    • Dimoka, A.1
  • 17
    • 84864914540 scopus 로고    scopus 로고
    • How to conduct a functional magnetic resonance (fMRI) study in social science research
    • Dimoka A. How to conduct a functional magnetic resonance (fMRI) study in social science research. MIS Quarterly 2012; 36(3):811-40.
    • (2012) MIS Quarterly , vol.36 , Issue.3 , pp. 811-840
    • Dimoka, A.1
  • 18
    • 84864958498 scopus 로고    scopus 로고
    • On the use of neurophysiological tools in information systems research: Developing a research agenda for NeuroIS
    • Dimoka A, Banker RD, Benbasat I, Davis FD, Dennis AR, Gefen D, et al. On the use of neurophysiological tools in information systems research: developing a research agenda for Neuro IS. MIS Quarterly 2012;36(3):679-702.
    • (2012) MIS Quarterly , vol.36 , Issue.3 , pp. 679-702
    • Dimoka, A.1    Banker, R.D.2    Benbasat, I.3    Davis, F.D.4    Dennis, A.R.5    Gefen, D.6
  • 22
    • 84880196111 scopus 로고    scopus 로고
    • Behavioral information security
    • Janczewski LJ, Colarik AM, editors Hershey, PA: USA: Information Science Reference
    • Fagnot IJ. Behavioral information security. In: Janczewski LJ, Colarik AM, editors. Encyclopedia of cyber warfare and cyber terrorism. Hershey, PA: USA: Information Science Reference; 2008. p. 199-205.
    • (2008) Encyclopedia of Cyber Warfare and Cyber Terrorism , pp. 199-205
    • Fagnot, I.J.1
  • 24
    • 81255163048 scopus 로고    scopus 로고
    • Understanding nonmalicious security violations in the workplace: A composite behavior model
    • Guo KH, Yuan Y, Archer NP, Connelly CE. Understanding nonmalicious security violations in the workplace: a composite behavior model. Journal of Management Information Systems 2011;28(2):203-36.
    • (2011) Journal of Management Information Systems , vol.28 , Issue.2 , pp. 203-236
    • Guo, K.H.1    Yuan, Y.2    Archer, N.P.3    Connelly, C.E.4
  • 25
    • 21944448888 scopus 로고    scopus 로고
    • Discourses of Danger and the Computer Hacker
    • Social Identify and Computer Networks
    • Halbert D. Discourses of danger and the computer hacker. The Information Society 1997;13(4):361-74. (Pubitemid 128001895)
    • (1997) Information Society , vol.13 , Issue.4 , pp. 361-374
    • Halbert, D.1
  • 26
    • 34547798962 scopus 로고    scopus 로고
    • Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
    • DOI 10.1016/j.dss.2006.04.004, PII S0167923606000625
    • Hansen JV, Lowry PB, Meservy R, McDonald D. Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems 2007;43(4):1362-74. (Pubitemid 47225189)
    • (2007) Decision Support Systems , vol.43 , Issue.4 , pp. 1362-1374
    • Hansen, J.V.1    Lowry, P.B.2    Meservy, R.D.3    McDonald, D.M.4
  • 27
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • Herath T, Rao H. Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems 2009a;47(2):154-65.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.2
  • 28
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath T, Rao H. Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems 2009b;18(2):106-25.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.2
  • 29
    • 84876551709 scopus 로고    scopus 로고
    • Lie to me: Gender deception and detection in computer-mediated communications
    • Provo, UT, USA. IFIP WG 8.11/11.13
    • Ho SM, McDonald N, Warkentin M. Lie to me: gender deception and detection in computer-mediated communications. The Dewald Roode Information Security Workshop. Provo, UT, USA. IFIP WG 8.11/11.13; 2012.
    • (2012) The Dewald Roode Information Security Workshop
    • Ho, S.M.1    McDonald, N.2    Warkentin, M.3
  • 31
    • 0039803550 scopus 로고
    • Hackers: Computer heroes or electronic highwaymen?
    • Hollinger RC. Hackers: computer heroes or electronic highwaymen? ACM SIGCAS Computers and Society 1991;21(1):6-17.
    • (1991) ACM SIGCAS Computers and Society , vol.21 , Issue.1 , pp. 6-17
    • Hollinger, R.C.1
  • 32
    • 84863542038 scopus 로고    scopus 로고
    • Managing employee compliance with information security policies: The role of top management and organizational culture
    • Hu Q, Dinev T, Hart P, Cooke D. Managing employee compliance with information security policies: the role of top management and organizational culture. Decision Sciences 2012;43(4):615-60.
    • (2012) Decision Sciences , vol.43 , Issue.4 , pp. 615-660
    • Hu, Q.1    Dinev, T.2    Hart, P.3    Cooke, D.4
  • 33
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence work in reducing information security policy abuse by employees?
    • Hu Q, Xu Z, Dinev T, Ling H. Does deterrence work in reducing information security policy abuse by employees? Communications of the ACM 2011a;54(6):54-60.
    • (2011) Communications of the ACM , vol.54 , Issue.6 , pp. 54-60
    • Hu, Q.1    Xu, Z.2    Dinev, T.3    Ling, H.4
  • 34
    • 84876522913 scopus 로고    scopus 로고
    • How can you tell a hacker from a geek? Ask whether he spends more time on computer games than sports!
    • Blacksburg, VA, USA. IFIP WG 8.11/11.13
    • Hu Q, Zhang C, Xu Z. How can you tell a hacker from a geek? Ask whether he spends more time on computer games than sports!. The Dewald Roode Information Security Workshop. Blacksburg, VA, USA. IFIP WG 8.11/11.13; 2011b.
    • (2011) The Dewald Roode Information Security Workshop
    • Hu, Q.1    Zhang, C.2    Xu, Z.3
  • 35
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    • Ifinedo P. Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Computers & Security 2012;31(1):83-95.
    • (2012) Computers & Security , vol.31 , Issue.1 , pp. 83-95
    • Ifinedo, P.1
  • 37
    • 80051745905 scopus 로고    scopus 로고
    • Effects of automated and participative decision support in computer-aided credibility assessment
    • Jensen ML, Lowry PB, Jenkins JL. Effects of automated and participative decision support in computer-aided credibility assessment. Journal of Management Information Systems 2011;28(1):201-34.
    • (2011) Journal of Management Information Systems , vol.28 , Issue.1 , pp. 201-234
    • Jensen, M.L.1    Lowry, P.B.2    Jenkins, J.L.3
  • 38
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston AC, Warkentin M. Fear appeals and information security behaviors: an empirical study. MIS Quarterly 2010;34(3): 549-66.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 39
    • 20944439353 scopus 로고    scopus 로고
    • A longitudinal model of continued IS use: An integrative view of four mechanisms underlying postadoption phenomena
    • DOI 10.1287/mnsc.1040.0326
    • Kim SS, Malhotra NK. A longitudinal model of continued IS use: an integrative view of four mechanisms underlying postadoption phenomena. Management Science 2005;51(5): 741-55. (Pubitemid 40867141)
    • (2005) Management Science , vol.51 , Issue.5 , pp. 741-755
    • Kim, S.S.1    Malhotra, N.K.2
  • 40
    • 84863328368 scopus 로고    scopus 로고
    • A framework for theory development in design science research: Multiple perspectives
    • Kuechler W, Vaishnavi V. A framework for theory development in design science research: multiple perspectives. Journal of the Association for Information Systems 2012;13(6):395-423.
    • (2012) Journal of the Association for Information Systems , vol.13 , Issue.6 , pp. 395-423
    • Kuechler, W.1    Vaishnavi, V.2
  • 41
    • 0345764837 scopus 로고    scopus 로고
    • Improving user security behaviour
    • Leach J. Improving user security behaviour. Computers & Security 2003;22(8):685-92.
    • (2003) Computers & Security , vol.22 , Issue.8 , pp. 685-692
    • Leach, J.1
  • 42
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee SM, Lee SG, Yoo S. An integrative model of computer abuse based on social control and general deterrence theories. Information & Management 2004;41(6):707-18.
    • (2004) Information & Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 43
    • 78650169218 scopus 로고    scopus 로고
    • Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective
    • Lee Y. Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective. Decision Support Systems 2011;50(2):361-9.
    • (2011) Decision Support Systems , vol.50 , Issue.2 , pp. 361-369
    • Lee, Y.1
  • 44
    • 67650166189 scopus 로고    scopus 로고
    • Threat or coping appraisal: Determinants of SMB executive's decision to adopt anti-malware software
    • Lee Y, Larsen KR. Threat or coping appraisal: determinants of SMB executive's decision to adopt anti-malware software. European Journal of Information Systems 2009;18(2): 177-87.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 177-187
    • Lee, Y.1    Larsen, K.R.2
  • 45
    • 33750041304 scopus 로고    scopus 로고
    • The Relative Impact of Violation Type and Lie Severity on Judgments of Message Deceitfulness
    • Levine TR, Asada KJK, Lindsey LLM. The relative impact of violation type and lie severity on judgments of message deceitfulness. Communication Research Reports 2003;20(3): 208-18. (Pubitemid 38061640)
    • (2003) Communication Research Reports , vol.20 , Issue.3 , pp. 208-218
    • Levine, T.R.1    Asada, K.J.K.2    Lindsey, L.L.M.3
  • 47
    • 77955121478 scopus 로고    scopus 로고
    • Understanding security behaviors in personal computer usage: A threat avoidance perspective
    • Liang H, Xue Y. Understanding security behaviors in personal computer usage: a threat avoidance perspective. Journal of the Association for Information Systems 2010;11(7):394-413.
    • (2010) Journal of the Association for Information Systems , vol.11 , Issue.7 , pp. 394-413
    • Liang, H.1    Xue, Y.2
  • 48
    • 79955636557 scopus 로고    scopus 로고
    • Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures
    • Lowry PB, Cao J, Everard A. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. Journal of Management Information Systems 2011;27(4): 165-204.
    • (2011) Journal of Management Information Systems , vol.27 , Issue.4 , pp. 165-204
    • Lowry, P.B.1    Cao, J.2    Everard, A.3
  • 49
    • 84863337613 scopus 로고    scopus 로고
    • Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups
    • Lowry PB, Zhang D, Zhou L, Fu X. Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups. Information Systems Journal 2010;20(3):297-315.
    • (2010) Information Systems Journal , vol.20 , Issue.3 , pp. 297-315
    • Lowry, P.B.1    Zhang, D.2    Zhou, L.3    Fu, X.4
  • 50
    • 77957096376 scopus 로고    scopus 로고
    • Moving toward black hat research in information systems security: An editorial introduction to the special issue
    • Mahmood MA, Siponen M, Straub D, Rao HR, Raghu T. Moving toward black hat research in information systems security: an editorial introduction to the special issue. MIS Quarterly 2010; 34(3):431-3.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 431-433
    • Mahmood, M.A.1    Siponen, M.2    Straub, D.3    Rao, H.R.4    Raghu, T.5
  • 51
    • 84933491052 scopus 로고
    • Information manipulation theory
    • McCornack SA. Information manipulation theory. Communication Monographs 1992;59(1):1-16.
    • (1992) Communication Monographs , vol.59 , Issue.1 , pp. 1-16
    • McCornack, S.A.1
  • 52
    • 84933490021 scopus 로고
    • When the alteration of information is viewed as deception: An empirical test of information manipulation theory
    • McCornack SA, Levine TR, Solowczuk KA, Torres HI, Campbell DM. When the alteration of information is viewed as deception: an empirical test of information manipulation theory. Communication Monographs 1992;59(1):17-29.
    • (1992) Communication Monographs , vol.59 , Issue.1 , pp. 17-29
    • McCornack, S.A.1    Levine, T.R.2    Solowczuk, K.A.3    Torres, H.I.4    Campbell, D.M.5
  • 53
    • 33846313618 scopus 로고    scopus 로고
    • The qualitative interview in IS research: Examining the craft
    • Myers MD, Newman M. The qualitative interview in IS research: examining the craft. Information and Organization 2007;17(1): 2-26.
    • (2007) Information and Organization , vol.17 , Issue.1 , pp. 2-26
    • Myers, M.D.1    Newman, M.2
  • 54
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules an empirical study
    • Myyry L, Siponen M, Pahnila S, Vartiainen T, Vance A. What levels of moral reasoning and values explain adherence to information security rules an empirical study. European Journal of Information Systems 2009;18(2):126-39.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 57
    • 1642602843 scopus 로고    scopus 로고
    • Projected offending and contemporaneous rule-violation: Implications for heterotypic continuity
    • Pogarsky G. Projected offending and contemporaneous rule-violation: implications for heterotypic continuity. Criminology 2004;42(1):111-36.
    • (2004) Criminology , vol.42 , Issue.1 , pp. 111-136
    • Pogarsky, G.1
  • 58
    • 84875487357 scopus 로고    scopus 로고
    • When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
    • Posey C, Bennett R, Roberts TL, Lowry PB. When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse. Journal of Information System Security 2011a;7(1):24-47.
    • (2011) Journal of Information System Security , vol.7 , Issue.1 , pp. 24-47
    • Posey, C.1    Bennett, R.2    Roberts, T.L.3    Lowry, P.B.4
  • 59
    • 80051795854 scopus 로고    scopus 로고
    • Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
    • Posey C, Bennett RJ, Roberts TL. Understanding the mindset of the abusive insider: an examination of insiders' causal reasoning following internal security changes. Computers & Security 2011b;30(6-7):486-97.
    • (2011) Computers & Security , vol.30 , Issue.6-7 , pp. 486-497
    • Posey, C.1    Bennett, R.J.2    Roberts, T.L.3
  • 60
    • 77952042701 scopus 로고    scopus 로고
    • The culture-influenced online community self-disclosure model: The case of working professionals in France and the UK whouse online communities
    • Posey C, Lowry PB, Roberts TL, Ellis S. The culture-influenced online community self-disclosure model: the case of working professionals in France and the UK whouse online communities. European Journal of Information Systems 2010;19(2):181-95.
    • (2010) European Journal of Information Systems , vol.19 , Issue.2 , pp. 181-195
    • Posey, C.1    Lowry, P.B.2    Roberts, T.L.3    Ellis, S.4
  • 61
    • 84876548646 scopus 로고    scopus 로고
    • Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations
    • Blacksburg, VA, USA. IFIP WG 8.11/11.13
    • Posey C, Roberts TL, Lowry PB. Motivating the insider to protect organizational information assets: evidence from protection motivation theory and rival explanations. The Dewald Roode Information Security Workshop. Blacksburg, VA, USA. IFIP WG 8.11/11.13; 2011c.
    • (2011) The Dewald Roode Information Security Workshop
    • Posey, C.1    Roberts, T.L.2    Lowry, P.B.3
  • 64
    • 33745740196 scopus 로고    scopus 로고
    • Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis
    • DOI 10.1080/01639620600605333, PII K5T326TU3661172R
    • Rogers M, Smoak ND, Liu J. Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis. Deviant Behavior 2006a;27(3):245-68. (Pubitemid 44011812)
    • (2006) Deviant Behavior , vol.27 , Issue.3 , pp. 245-268
    • Rogers, M.1    Smoak, N.D.2    Liu, J.3
  • 65
    • 84868347410 scopus 로고    scopus 로고
    • Self-reported computer criminal behavior: A psychological analysis
    • DOI 10.1016/j.diin.2006.06.002, PII S1742287606000636
    • Rogers MK, Seigfried K, Tidke K. Self-reported computer criminal behavior: a psychological analysis. Digital Investigation 2006b; 3(Suppl.):116-20. (Pubitemid 44066904)
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. , pp. 116-120
    • Rogers, M.K.1    Seigfried, K.2    Tidke, K.3
  • 66
    • 0002247369 scopus 로고
    • Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
    • Cacioppo JT, Petty RE, editors New York, NY, USA: Guilford
    • Rogers RW. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. In: Cacioppo JT, Petty RE, editors. Social psychophysiology: a sourcebook. New York, NY, USA: Guilford; 1983. p. 153-76.
    • (1983) Social Psychophysiology: A Sourcebook , pp. 153-176
    • Rogers, R.W.1
  • 67
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' - A human/computer interaction approach to usable and effective security
    • DOI 10.1023/A:1011902718709
    • Sasse MA, Brostoff S, Weirich D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 2001;19(3): 122-31. (Pubitemid 32903117)
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 69
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • Siponen M, Vance A. Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly 2010;34(3):487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 70
    • 84869427548 scopus 로고    scopus 로고
    • A critical assessment of IS security research between 1990-2004
    • St. Gallen, Switzerland
    • Siponen M, Willison R. A critical assessment of IS security research between 1990-2004. In: 15th European conference on information systems. St. Gallen, Switzerland; 2007. p. 1551-9.
    • (2007) 15th European Conference on Information Systems , pp. 1551-1559
    • Siponen, M.1    Willison, R.2
  • 71
    • 67651102640 scopus 로고    scopus 로고
    • Information security management standards: Problems and solutions
    • Siponen M, Willison R. Information security management standards: problems and solutions. Information & Management 2009;46(5):267-70.
    • (2009) Information & Management , vol.46 , Issue.5 , pp. 267-270
    • Siponen, M.1    Willison, R.2
  • 72
    • 33846076044 scopus 로고    scopus 로고
    • The role of espoused national cultural values in technology acceptance
    • Srite M, Karahanna E. The role of espoused national cultural values in technology acceptance. MIS Quarterly 2006;30(3): 679-704. (Pubitemid 46061266)
    • (2006) MIS Quarterly: Management Information Systems , vol.30 , Issue.3 , pp. 679-704
    • Srite, M.1    Karahanna, E.2
  • 73
    • 17844366573 scopus 로고    scopus 로고
    • Analysis of end user security behaviors
    • DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
    • Stanton JM, Stam KR, Mastrangelo P, Jolton J. Analysis of end user security behaviors. Computers & Security 2005;24(2):124-33. (Pubitemid 40583824)
    • (2005) Computers and Security , vol.24 , Issue.2 , pp. 124-133
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.3    Jolton, J.4
  • 74
    • 85139599019 scopus 로고    scopus 로고
    • Behavioral information security: An overview, results, and research agenda
    • Zhang P, Galletta DF, editors foundations. Armonk, NY, USA: M.E. Sharpe
    • Stanton JM, Stam KR, Mastrangelo PM, Jolton JA. Behavioral information security: an overview, results, and research agenda. In: Zhang P, Galletta DF, editors. Humanecomputer interaction and management information systems: foundations. Armonk, NY, USA: M.E. Sharpe; 2006. p. 262-80.
    • (2006) Humanecomputer Interaction and Management Information Systems , pp. 262-280
    • Stanton, J.M.1    Stam, K.R.2    Mastrangelo, P.M.3    Jolton, J.A.4
  • 75
    • 0003196246 scopus 로고
    • Measuring system usage: Implications for IS theory testing
    • Straub D, Limayem M, Karahanna-Evaristo E. Measuring system usage: implications for IS theory testing. Management Science 1995;41(8):1328-42.
    • (1995) Management Science , vol.41 , Issue.8 , pp. 1328-1342
    • Straub, D.1    Limayem, M.2    Karahanna-Evaristo, E.3
  • 77
    • 0002699431 scopus 로고
    • Discovering and disciplining computer abuse in organization
    • Straub DW, Nance WD. Discovering and disciplining computer abuse in organization. MIS Quarterly 1990;14(1):45.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45
    • Straub, D.W.1    Nance, W.D.2
  • 78
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub DW, Welke RJ. Coping with systems risk: security planning models for management decision making. MIS Quarterly 1998; 22(4):441-69.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 80
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of ISO17799
    • DOI 10.1016/j.cose.2005.05.002, PII S0167404805000684
    • Theoharidou M, Kokolakis S, Karyda M, Kiountouzis E. The insider threat to information systems and the effectiveness of ISO17799. Computers & Security 2005;24(6):472-84. (Pubitemid 41277034)
    • (2005) Computers and Security , vol.24 , Issue.6 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 81
    • 84876558911 scopus 로고    scopus 로고
    • A new approach to the problem of unauthorized access: Raising perceptions of accountability through user interface design features
    • Blacksburg, VA, USA. IFIP WG 8.11/11.13
    • Vance A, Molyneux B, Lowry PB. A new approach to the problem of unauthorized access: raising perceptions of accountability through user interface design features. The Dewald Roode Information Security Workshop. Blacksburg, VA, USA. IFIP WG 8.11/11.13; 2011.
    • (2011) The Dewald Roode Information Security Workshop
    • Vance, A.1    Molyneux, B.2    Lowry, P.B.3
  • 84
    • 0033872521 scopus 로고    scopus 로고
    • Theoretical extension of the Technology Acceptance Model: Four longitudinal field studies
    • Venkatesh V, Davis FD. A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science 2000;46(2):186-204. (Pubitemid 30594361)
    • (2000) Management Science , vol.46 , Issue.2 , pp. 186-204
    • Venkatesh, V.1    Davis, F.D.2
  • 85
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • Vroom C, von Solms R. Towards information security behavioural compliance. Computers & Security 2004;23(3):191-8.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 86
    • 84861553944 scopus 로고    scopus 로고
    • Are we making a better world with ICTs? Reflections on a future agenda for the IS field
    • Walsham G. Are we making a better world with ICTs? Reflections on a future agenda for the IS field. Journal of Information Technology 2012;27(2):87-93.
    • (2012) Journal of Information Technology , vol.27 , Issue.2 , pp. 87-93
    • Walsham, G.1
  • 87
    • 79955622246 scopus 로고    scopus 로고
    • The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
    • Warkentin M, Johnston AC, Shropshire J. The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems 2011a;20(3):267-84.
    • (2011) European Journal of Information Systems , vol.20 , Issue.3 , pp. 267-284
    • Warkentin, M.1    Johnston, A.C.2    Shropshire, J.3
  • 91
    • 84979032883 scopus 로고    scopus 로고
    • Identifying the neural correlates of protection motivation for secure IT behaviors
    • 2012. Gmunden, Austria
    • Warkentin M, Walden EA, Johnston AC, Straub DW. Identifying the neural correlates of protection motivation for secure IT behaviors. Gmunden Retreat on NeuroIS 2012b;2012. Gmunden, Austria.
    • (2012) Gmunden Retreat on Neuro is
    • Warkentin, M.1    Walden, E.A.2    Johnston, A.C.3    Straub, D.W.4
  • 92
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: The insider threat
    • Warkentin M, Willison R. Behavioral and policy issues in information systems security: the insider threat. European Journal of Information Systems 2009;18(2):101-5.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 93
    • 17444408257 scopus 로고    scopus 로고
    • Crime as alternative: Towards a cross-level situational action theory of crime causation
    • McCord J, editor New Brunswick, NJ: Transaction Publishers
    • Wikström PO. Crime as alternative: towards a cross-level situational action theory of crime causation. In: McCord J, editor. Beyond empiricism: institutions and intentions in the study of crime. New Brunswick, NJ: Transaction Publishers; 2004. p. 1-38.
    • (2004) Beyond Empiricism: Institutions and Intentions in the Study of Crime , pp. 1-38
    • Wikström, P.O.1
  • 94
    • 84927964522 scopus 로고    scopus 로고
    • Linking individual, setting, and acts of crime. Situational mechanisms and the explanation of crime
    • Wikström H, Sampson RJ, editors Cambridge, UK: Cambridge University Press
    • Wikström PO. Linking individual, setting, and acts of crime. situational mechanisms and the explanation of crime. In: Wikström H, Sampson RJ, editors. The explanation of crime: contexts, mechanisms, and development. Cambridge, UK: Cambridge University Press; 2006.
    • (2006) The Explanation of Crime: Contexts, Mechanisms, and Development
    • Wikström, P.O.1
  • 95
    • 33750683067 scopus 로고    scopus 로고
    • Understanding the perpetration of employee computer crime in the organisational context
    • DOI 10.1016/j.infoandorg.2006.08.001, PII S1471772706000224
    • Willison R. Understanding the perpetration of employee computer crime in the organisational context. Information and Organization 2006;16(4):304-24. (Pubitemid 44698429)
    • (2006) Information and Organization , vol.16 , Issue.4 , pp. 304-324
    • Willison, R.1
  • 96
    • 33749351964 scopus 로고    scopus 로고
    • Opportunities for computer crime: Considering systems risk from a criminological perspective
    • DOI 10.1057/palgrave.ejis.3000592, PII 3000592
    • Willison R, Backhouse J. Opportunities for computer crime: considering systems risk from a criminological perspective. European Journal of Information Systems 2006;15(4): 403-14. (Pubitemid 44494839)
    • (2006) European Journal of Information Systems , vol.15 , Issue.4 , pp. 403-414
    • Willison, R.1    Backhouse, J.2
  • 97
    • 84873974226 scopus 로고    scopus 로고
    • Beyond deterrence: An expanded view of employee computer abuse
    • Willison R, Warkentin M. Beyond deterrence: an expanded view of employee computer abuse. MIS Quarterly; 2013;37(1).
    • (2013) MIS Quarterly , vol.37 , Issue.1
    • Willison, R.1    Warkentin, M.2
  • 99
    • 77955042436 scopus 로고    scopus 로고
    • The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
    • Wright RT, Marett K. The influence of experiential and dispositional factors in phishing: an empirical investigation of the deceived. Journal of Management Information Systems 2010;27(1):273-303.
    • (2010) Journal of Management Information Systems , vol.27 , Issue.1 , pp. 273-303
    • Wright, R.T.1    Marett, K.2
  • 100
    • 85045160218 scopus 로고    scopus 로고
    • Computer hacking: Just another case of juvenile delinquency?
    • Yar M. Computer hacking: just another case of juvenile delinquency? The Howard Journal of Criminal Justice 2005; 44(4):387-99.
    • (2005) The Howard Journal of Criminal Justice , vol.44 , Issue.4 , pp. 387-399
    • Yar, M.1
  • 101
    • 0003673547 scopus 로고    scopus 로고
    • Case study research: Design and methods
    • CA: Sage Publications
    • Yin RK. Case study research: design and methods. Newbury Park, CA: Sage Publications; 2009.
    • (2009) Newbury Park
    • Yin, R.K.1
  • 104
    • 49249108825 scopus 로고    scopus 로고
    • Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems
    • Zhang D, Lowry PB. Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems. Journal of Global Information Management 2008;16(1):61-92.
    • (2008) Journal of Global Information Management , vol.16 , Issue.1 , pp. 61-92
    • Zhang, D.1    Lowry, P.B.2
  • 105
    • 38349101624 scopus 로고    scopus 로고
    • The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence
    • Zhang D, Lowry PB, Zhou L, Fu X. The impact of individualism- collectivism, social presence, and group diversity on group decision making under majority influence. Journal of Management Information Systems 2007;23(4):53-80.
    • (2007) Journal of Management Information Systems , vol.23 , Issue.4 , pp. 53-80
    • Zhang, D.1    Lowry, P.B.2    Zhou, L.3    Fu, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.