메뉴 건너뛰기




Volumn , Issue , 2007, Pages 199-205

Behavioral information security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84880196111     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-59140-991-5.ch025     Document Type: Chapter
Times cited : (13)

References (18)
  • 4
    • 0036398120 scopus 로고    scopus 로고
    • Policy enforcement in the workplace
    • David, J. (2002). Policy enforcement in the workplace. Computers and Security, 21(6), 506513.
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 506513
    • David, J.1
  • 5
    • 0042985337 scopus 로고    scopus 로고
    • Ernst and Young LLP, Presentation Services
    • Ernst and Young LLP. (2002). Global information security survey. Presentation Services.
    • (2002) Global Information Security Survey
  • 6
    • 84898196282 scopus 로고    scopus 로고
    • Using security assessment interviews to predict organizational security status
    • Las Vegas, NV
    • Fagnot, I. J., & Stanton, J. M. (2006). Using security assessment interviews to predict organizational security status. The Security Conference, Las Vegas, NV.
    • (2006) The Security Conference
    • Fagnot, I.J.1    Stanton, J.M.2
  • 8
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic, A. G., & Clark, G. J. (2004). Why there aren't more information security research studies. Information & Management, 41, 597-607.
    • (2004) Information & Management , vol.41 , pp. 597-607
    • Kotulic, A.G.1    Clark, G.J.2
  • 11
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the "weakest link": A human/computer interaction approach to usable and effective security
    • Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the "weakest link": A human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122-131.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 12
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E. E. (2002). A framework for understanding and predicting insider attacks. Computers and Security, 21(6), 526-531.
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 16
    • 84898288035 scopus 로고    scopus 로고
    • The madness of crowds: Employees beliefs about information security in relation to security outcomes
    • Las Vegas, NV
    • Stanton, J. M., Yamodo-Fagnot, I., & Stam, K. R. (2005). The madness of crowds: Employees beliefs about information security in relation to security outcomes. The Security Conference, Las Vegas, NV.
    • (2005) The Security Conference
    • Stanton, J.M.1    Yamodo-Fagnot, I.2    Stam, K.R.3
  • 17
    • 84898236267 scopus 로고    scopus 로고
    • information systems security governance research: A behavioral perspective
    • Albany, NY
    • Sushma, M., & Dhillon, G. (2006). information systems security governance research: A behavioral perspective. NYS Cyber Security Conference (NYS CSIS), Albany, NY.
    • (2006) NYS Cyber Security Conference (NYS CSIS)
    • Sushma, M.1    Dhillon, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.