메뉴 건너뛰기




Volumn 22, Issue 1, 2014, Pages 115-126

Recommendations for information security awareness training for college students

Author keywords

College students' information security awareness; Information security; Information security awareness training; Students; Training

Indexed keywords

COLLEGE STUDENTS; DESIGN/METHODOLOGY/APPROACH; GRADUATE STUDENTS; INFORMATION SECURITY AWARENESS; NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY; NEW ENGLAND;

EID: 84893649270     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/IMCS-01-2013-0005     Document Type: Review
Times cited : (69)

References (41)
  • 1
    • 77956906456 scopus 로고    scopus 로고
    • An overview of social engineering malware: Trends, tactics, and implications
    • Abraham, S. and Chengalur-Smith, I. (2010), "An overview of social engineering malware: trends, tactics, and implications", Technology in Society, Vol. 32 No. 3, pp. 183-196.
    • (2010) Technology in Society , vol.32 , Issue.3 , pp. 183-196
    • Abraham, S.1    Chengalur-Smith, I.2
  • 2
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computing practices: A rational choice perspective
    • Aytes, K. and Terry, C. (2004), "Computer security and risky computing practices: a rational choice perspective", Journal of Organizational and End User Computing, Vol. 16 No. 3, pp. 22-40.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.3 , pp. 22-40
    • Aytes, K.1    Terry, C.2
  • 4
    • 6744255767 scopus 로고    scopus 로고
    • Penetration testing through social engineering
    • Ceraolo, J.P. (1996), "Penetration testing through social engineering", Information Systems Security, Vol. 4 No. 4, pp. 37-48.
    • (1996) Information Systems Security , vol.4 , Issue.4 , pp. 37-48
    • Ceraolo, J.P.1
  • 7
    • 84893668597 scopus 로고    scopus 로고
    • DBIR, Data Breach Investigation Report (accessed 10 December 2012)
    • DBIR (2011), Verizon, Data Breach Investigation Report, available at: www.verizonbusiness.com/resources/reports/rp-data-breach-investigations-report- 2011-en-xg.pdf (accessed 10 December 2012).
    • (2011) Verizon
  • 9
    • 63049137706 scopus 로고    scopus 로고
    • Information security: The moving target
    • Dlamini, M.T., Eloff, J.H.P. and Eloff, M.M. (2009), "Information security: the moving target", Computer & Security, Vol. 28 Nos 3/4, pp. 189-198.
    • (2009) Computer & Security , vol.28 , Issue.3-4 , pp. 189-198
    • Dlamini, M.T.1    Eloff, J.H.P.2    Eloff, M.M.3
  • 10
  • 11
  • 15
    • 85003712015 scopus 로고    scopus 로고
    • Designing a security awareness program: Part 1
    • January/February
    • Hansche, S. (2001), "Designing a security awareness program: part 1", Information Systems Security, January/February, pp. 14-22.
    • (2001) Information Systems Security , pp. 14-22
    • Hansche, S.1
  • 16
    • 84886247304 scopus 로고    scopus 로고
    • Top 10 IT issues 2011
    • May/June
    • Ingerman, B.L. and Yang, C. (2011), "Top 10 IT issues 2011", Educause Review, May/June, pp. 26-40.
    • (2011) Educause Review , pp. 26-40
    • Ingerman, B.L.1    Yang, C.2
  • 17
    • 34250922831 scopus 로고
    • The varimax criterion for analytic rotation in factor analysis
    • Kaiser, H.F. (1958), "The varimax criterion for analytic rotation in factor analysis", Psychometrika, Vol. 23, pp. 187-200.
    • (1958) Psychometrika , vol.23 , pp. 187-200
    • Kaiser, H.F.1
  • 18
    • 43249095597 scopus 로고    scopus 로고
    • An assessment of end user vulnerability to phishing attacks
    • Karakasiliotis, A., Furnell, S. and Papadaki, M. (2007), "An assessment of end user vulnerability to phishing attacks", Journal of Information Warfare, Vol. 6 No. 1, pp. 17-28.
    • (2007) Journal of Information Warfare , vol.6 , Issue.1 , pp. 17-28
    • Karakasiliotis, A.1    Furnell, S.2    Papadaki, M.3
  • 20
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • Kruger, H.A. and Kearney, W.D. (2006), "A prototype for assessing information security awareness", Computers & Security, Vol. 25 No. 4, pp. 289-296.
    • (2006) Computers & Security , vol.25 , Issue.4 , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 23
    • 84893698734 scopus 로고    scopus 로고
    • March 9 (accessed December 10, 2012)
    • Microsoft (2010), "P2P file sharing: know the risks, security for your home", March 9, available at: www.microsoft.com/canada/protect/ protect-yourself/protect-your-data/article.aspx?article=p2p-file-sharing-know- the-risks (accessed December 10, 2012).
    • (2010) P2P File Sharing: Know the Risks, Security for Your Home
  • 28
    • 78650770842 scopus 로고    scopus 로고
    • Improving employees' compliance through information systems security training: An action research study
    • Puhakainen, P. and Siponen, M.T. (2010), "Improving employees' compliance through information systems security training: an action research study", MIS Quarterly, Vol. 34 No. 4, pp. 757-778.
    • (2010) MIS Quarterly , vol.34 , Issue.4 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.T.2
  • 30
    • 56249140028 scopus 로고    scopus 로고
    • The impact of information richness on information security awareness training effectiveness
    • Shaw, R.S., Chen, C.C., Harris, A.L. and Huang, H.J. (2009), "The impact of information richness on information security awareness training effectiveness", Computers & Education, Vol. 52, pp. 92-100.
    • (2009) Computers & Education , vol.52 , pp. 92-100
    • Shaw, R.S.1    Chen, C.C.2    Harris, A.L.3    Huang, H.J.4
  • 31
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, M.T. (2000), "A conceptual foundation for organizational information security awareness", Information Management & Computer Security, Vol. 8 No. 1, pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.T.1
  • 33
    • 84991176343 scopus 로고
    • Training needs assessment at work: A dynamic process
    • Sleezer, C.M. (1993), "Training needs assessment at work: a dynamic process", Human Resource Development Quarterly, Vol. 4, pp. 247-264.
    • (1993) Human Resource Development Quarterly , vol.4 , pp. 247-264
    • Sleezer, C.M.1
  • 34
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • Straub, D.W. (1990), "Effective is security: an empirical study", Information Systems Research, Vol. 1 No. 3, pp. 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.W.1
  • 35
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W. and Welke, R.J. (1998), "Coping with systems risk: security planning models for management decision making", MIS Quarterly, Vol. 22 No. 4, pp. 441-464.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 36
    • 8844242857 scopus 로고    scopus 로고
    • Personalize training: Determine learning styles, personality types and multiple intelligences online
    • Vincent, A. and Ross, D. (2001), "Personalize training: determine learning styles, personality types and multiple intelligences online", The Learning Organization, Vol. 8 No. 1, pp. 36-43.
    • (2001) The Learning Organization , vol.8 , Issue.1 , pp. 36-43
    • Vincent, A.1    Ross, D.2
  • 37
    • 3042812983 scopus 로고    scopus 로고
    • The 10 deadly sins of information security management
    • von Solms, B. and von Solms, R. (2004), "The 10 deadly sins of information security management", Computers & Security, Vol. 23, pp. 371-376.
    • (2004) Computers & Security , vol.23 , pp. 371-376
    • Von Solms, B.1    Von Solms, R.2
  • 38
    • 84995871700 scopus 로고    scopus 로고
    • Gaining access with social engineering: An empirical study of the threat
    • Workman, M. (2007), "Gaining access with social engineering: an empirical study of the threat", Information Systems Security, Vol. 16, pp. 315-331.
    • (2007) Information Systems Security , vol.16 , pp. 315-331
    • Workman, M.1
  • 39
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M., Bommer, W.H. and Straub, D. (2008), "Security lapses and the omission of information security measures: a threat control model and empirical test", Computers in Human Behavior, Vol. 24 No. 6, pp. 2799-2816.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 40
    • 0003344181 scopus 로고
    • Training needs assessment: The broadening focus of a simple construct
    • Howard, A. (Ed.), Guilford Press, New York, NY
    • Zemke, R.E. (1994), "Training needs assessment: the broadening focus of a simple construct", in Howard, A. (Ed.), Diagnosis for Organizational Change: Methods and Models, Guilford Press, New York, NY, pp. 139-151.
    • (1994) Diagnosis for Organizational Change: Methods and Models , pp. 139-151
    • Zemke, R.E.1
  • 41
    • 0036884659 scopus 로고    scopus 로고
    • The human firewall manifesto
    • Wood, C.C. (2002),"The human firewall manifesto",Computer Security Journal, Vol. 18 No.1,pp.15-18.
    • (2002) Computer Security Journal , vol.18 , Issue.1 , pp. 15-18
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.