메뉴 건너뛰기




Volumn 49, Issue , 2010, Pages 45-71

Insider threat and information security management

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84882800467     PISSN: 15682633     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-1-4419-7133-3_3     Document Type: Article
Times cited : (33)

References (37)
  • 7
    • 84882792603 scopus 로고    scopus 로고
    • 0830, C.W.: Countering Insider Threats, Dagstuhl Seminar2
    • Bishop, M., Gollmann, D., Hunker, J., Probst, C.W.: Countering Insider Threats, Dagstuhl Seminar 08302 (2008)
    • (2008) Probst
    • Bishop, M.1    Gollmann, D.2    Hunker, J.3
  • 9
    • 84882785907 scopus 로고    scopus 로고
    • Centre for the Protection of National Infrastructure, United Kingdom
    • Centre for the Protection of National Infrastructure: Ongoing personnel security-A good practise guide. United Kingdom (2008)
    • (2008) Ongoing personnel security-A good practise guide
  • 12
    • 0001323143 scopus 로고
    • Situational crime prevention: Theory and practice
    • Clarke, R.: Situational crime prevention: theory and practice. British Journal of Criminology. 20, 136-137 (1980)
    • (1980) British Journal of Criminology , vol.20 , pp. 136-137
    • Clarke, R.1
  • 16
    • 57649102137 scopus 로고    scopus 로고
    • Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique
    • Crinson, I.: Assessing the 'insider-outsider threat' duality in the context of the development of public-private partnerships delivering 'choice' in healthcare services: A sociomaterial critique. Information Security Technical Report, 13 (4), 202-206 (2008)
    • (2008) Information Security Technical Report , vol.13 , Issue.4 , pp. 202-206
    • Crinson, I.1
  • 20
    • 0003991890 scopus 로고
    • Berkeley, University of California Press, CA
    • Hirschi, T.: Causes of delinquency. Berkeley, University of California Press, CA (1969)
    • (1969) Causes of delinquency
    • Hirschi, T.1
  • 21
    • 57649090183 scopus 로고    scopus 로고
    • Information security management standards: Compliance, governance and risk management
    • Humphreys, E.:Information security management standards: Compliance, governance and risk management. Information Security Tech. Report, 13 (4), 247-255 (2008)
    • (2008) Information Security Tech. Report , vol.13 , Issue.4 , pp. 247-255
    • Humphreys, E.1
  • 25
    • 57649085788 scopus 로고    scopus 로고
    • ISMS Insider Intrusion Prevention and Detection
    • Overill, R.E.: ISMS Insider Intrusion Prevention and Detection. Information Security Technical Report, 13 (4), 216-219 (2008)
    • (2008) Information Security Technical Report , vol.13 , Issue.4 , pp. 216-219
    • Overill, R.E.1
  • 26
    • 78650874414 scopus 로고    scopus 로고
    • Information Security Culture: The Socio-Cultural Dimension in Information Security Management
    • In:, Cairo, Egypt. IFIP Conference Proceedings 214
    • Schlienger, T., Teufel, S.:Information Security Culture: The Socio-Cultural Dimension in Information Security Management. In: Proc. of IFIP TC11 17th International Conference on Information Security (SEC2002), Cairo, Egypt. IFIP Conference Proceedings 214, pp. 191-202 (2002)
    • (2002) Proc. of IFIP TC11 17th International Conference on Information Security (SEC2002) , pp. 191-202
    • Schlienger, T.1    Teufel, S.2
  • 28
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W., Welke, R.J.: Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22 (4) 441-465 (1998)
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-465
    • Straub, D.W.1    Welke, R.J.2
  • 29
    • 0003805614 scopus 로고
    • J.B. Lippincott, Philadelphia
    • Sutherland, E.: Criminology. J.B. Lippincott, Philadelphia (1924)
    • (1924) Criminology
    • Sutherland, E.1
  • 30
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to Information Systems and the effectiveness of ISO 17799
    • Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E.: The insider threat to Information Systems and the effectiveness of ISO 17799. Computers & Security, 24 (6), 472-484 (2005)
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 32
    • 0033657872 scopus 로고    scopus 로고
    • Information Security-The Third Wave?
    • von Solms, B.: Information Security-The Third Wave? Computers & Security, 19 (7) 615-620 (2000)
    • (2000) Computers & Security , vol.19 , Issue.7 , pp. 615-620
    • von Solms, B.1
  • 33
    • 57649220126 scopus 로고    scopus 로고
    • Practical management of malicious insider threat-An enterprise CSIRT perspective
    • Walker, T.: Practical management of malicious insider threat-An enterprise CSIRT perspective. Information Security Technical Report, 13 (4), 225-234 (2008)
    • (2008) Information Security Technical Report , vol.13 , Issue.4 , pp. 225-234
    • Walker, T.1
  • 35
    • 12344260478 scopus 로고    scopus 로고
    • Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminological theory to the IS security context
    • In
    • Willison, R.: Understanding the offender/environment dynamic for computer crimes: Assessing the feasibility of applying criminological theory to the IS security context. In: Proc. of the 37th Hawaii International Conference on System Sciences (2004)
    • (2004) Proc. of the 37th Hawaii International Conference on System Sciences
    • Willison, R.1
  • 37
    • 33750683067 scopus 로고    scopus 로고
    • Understanding the perpetration of employee computer crime in the organizational context
    • Willison, R.: Understanding the perpetration of employee computer crime in the organizational context. Information & Organization, 16 (4), 304-324 (2006)
    • (2006) Information & Organization , vol.16 , Issue.4 , pp. 304-324
    • Willison, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.