메뉴 건너뛰기




Volumn 21, Issue 3, 2013, Pages 191-201

Democracy, culture and information security: A case study in Zanzibar

Author keywords

Democracy; Information security; National cultures; Zanzibar

Indexed keywords

DEMOCRACY; INFORMATION SECURITY MODELS; NATIONAL CULTURES; ORGANISATIONAL CULTURE; SECURITY IMPLEMENTATIONS; SEMI STRUCTURED INTERVIEWS; UNCERTAINTY AVOIDANCE; ZANZIBAR;

EID: 84881107080     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/IMCS-09-2012-0057     Document Type: Article
Times cited : (9)

References (23)
  • 1
    • 84881117308 scopus 로고    scopus 로고
    • BBC (accessed 24 September 2012)
    • BBC (2005), "Pre-election violence in Zanzibar", available at: http://news.bbc.co.uk/1/hi/world/a frica/4325950.stm (accessed 24 September 2012).
    • (2005) Pre-election Violence in Zanzibar
  • 2
    • 85044903948 scopus 로고    scopus 로고
    • Terrorism in context: Race, religion, party, and violent conflict in Zanzibar
    • Brent, B. and Mshigeni, D. (2004), "Terrorism in context: race, religion, party, and violent conflict in Zanzibar", The American Sociologist, Vol. 35 No. 2, pp. 60-74.
    • (2004) The American Sociologist , vol.35 , Issue.2 , pp. 60-74
    • Brent, B.1    Mshigeni, D.2
  • 8
    • 84965527966 scopus 로고
    • The culture-free context of organization structure: A tri-national comparison
    • Hickson, D.J., Hinings, C.R., McMillan, C.J. and Schwitter, J.P. (1974), "The culture-free context of organization structure: a tri-national comparison", Sociology, Vol. 8, pp. 59-80.
    • (1974) Sociology , vol.8 , pp. 59-80
    • Hickson, D.J.1    Hinings, C.R.2    McMillan, C.J.3    Schwitter, J.P.4
  • 16
  • 17
    • 84881117659 scopus 로고    scopus 로고
    • Technical and moral values
    • technical and moral values", Journal of Business Ethics, Vol. 53, pp. 87-96.
    • Journal of Business Ethics , vol.53 , pp. 87-96
  • 18
    • 84881097739 scopus 로고    scopus 로고
    • MaalimSeif for smooth transition of power in Zbar
    • 30 October (accessed 24 September 2012)
    • Sadallah, M. (2010), "MaalimSeif for smooth transition of power in Zbar", The Guardian, 30 October, available at: http://ippmedia.com (accessed 24 September 2012).
    • (2010) The Guardian
    • Sadallah, M.1
  • 20
    • 77955673648 scopus 로고    scopus 로고
    • Information security culture - From analysis to change
    • Eloff, J., Venter, H., Labuschagne L. and EloffM. (Eds), IS South Africa Johannesburg, South Africa
    • Schlienger, T. and Teufel, S. (2003), "Information security culture - from analysis to change", in Eloff, J., Venter, H., Labuschagne, L. and Eloff, M. (Eds), IS South Africa - Proceedings of ISSA 2003, 3rd Annual IS South Africa Conference, Johannesburg, South Africa.
    • (2003) Proceedings of ISSA 2003, 3rd Annual IS South Africa Conference
    • Schlienger, T.1    Teufel, S.2
  • 21
    • 24644438691 scopus 로고    scopus 로고
    • The human factor in security
    • Shaaban, H., Conrad, M. and French, T. (2012) State of information security in Zanzibars public sector", paper presented at IST-Africa 2012, Dar es Salaam, Tanzania, 10-13 May
    • Schultz, E. (2005), "The human factor in security", Computers & Security, Vol. 24, pp. 425-426. Shaaban, H., Conrad, M. and French, T. (2012), "State of information security in Zanzibars public sector", paper presented at IST-Africa 2012, Dar es Salaam, Tanzania, 10-13 May.
    • (2005) Computers & Security , vol.24 , pp. 425-426
    • Schultz, E.1
  • 22
    • 3943091829 scopus 로고    scopus 로고
    • The effect of national culture on the adoption of innovations
    • van Everdingen, Y. and Waarts, E. (2003), "The effect of national culture on the adoption of innovations", Marketing Letters, Vol. 14 No. 3, pp. 217-232.
    • (2003) Marketing Letters , vol.14 , Issue.3 , pp. 217-232
    • Van Everdingen, Y.1    Waarts, E.2
  • 23
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • Vroom, C. and von Solms, R. (2004), "Towards information security behavioural compliance", Computer and Security, Vol. 23, pp. 191-198.
    • (2004) Computer and Security , vol.23 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.