메뉴 건너뛰기




Volumn 22, Issue 1, 2014, Pages 24-41

Information security in the South Australian real estate industry: A study of 40 real estate organisations

Author keywords

Computer security; Information security; Real estate sector; Risk management; Surveys

Indexed keywords

DESIGN/METHODOLOGY/APPROACH; FACE-TO-FACE INTERVIEW; INFORMATION AND COMMUNICATION TECHNOLOGIES; INFORMATION SECURITY RISK MANAGEMENTS; INFORMATION SECURITY THREATS; QUALITATIVE METHODOLOGIES; REAL ESTATE; REAL ESTATE INDUSTRIES;

EID: 84893656776     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/IMCS-10-2012-0060     Document Type: Article
Times cited : (20)

References (28)
  • 1
    • 84893666127 scopus 로고    scopus 로고
    • AAP, January 13 (accessed March 7, 2013)
    • AAP (2011), "Vodafone sacks staff over privacy breach", January 13, available at: www.news.com.au/business/vodafone-sacks-staff-over-privacy- breach/story-e6frfm1i-1225987337818 (accessed March 7, 2013).
    • (2011) Vodafone Sacks Staff over Privacy Breach
  • 2
    • 84893644822 scopus 로고    scopus 로고
    • Australian Bureau of Statistics (accessed March 7, 2013)
    • ABS (2011), 8153.0 - Internet Activity, Australia, June 2011, Australian Bureau of Statistics, available at: www.abs.gov.au/AUSSTATS/abs.nsf/DetailsPage/ 8153.0June%202011 (accessed March 7, 2013).
    • (2011) 8153.0 - Internet Activity, Australia, June 2011
  • 3
    • 84873382434 scopus 로고    scopus 로고
    • Australian Bureau of Statistics (accessed March 7, 2013)
    • ABS (2012), 1301.0 - Year Book Australia, 2012, Australian Bureau of Statistics, available at: www.abs.gov.au/ausstats/abs.nsf/Lookup/by%20Subject/ 1301.0~2012~Main%20Features~Home%20page~1 (accessed March 7, 2013).
    • (2012) 1301.0 - Year Book Australia, 2012
  • 4
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Anderson, R. and Moore, T. (2006), "The economics of information security", Science, Vol. 314, pp. 610-613.
    • (2006) Science , vol.314 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 5
    • 84893684864 scopus 로고    scopus 로고
    • accessed May 13, 2012
    • Australian Government Defence Signals Directorate (2011), Strategies to Mitigate Targeted Cyber Intrusions, available at: www.dsd.gov.au/infosec/ top35mitigationstrategies.htm (accessed May 13, 2012).
    • (2011) Strategies to Mitigate Targeted Cyber Intrusions
  • 6
    • 84893672570 scopus 로고    scopus 로고
    • accessed November 2, 2012
    • Australian Government Defence Signals Directorate (2012), Information Security Manual Controls, available at: www.dsd.gov.au/publications/Information- Security-Manual-2012-Controls.pdf (accessed November 2, 2012).
    • (2012) Information Security Manual Controls
  • 7
    • 33744916686 scopus 로고    scopus 로고
    • Addison-Wesley Professional, Upper Saddle River, NJ
    • Bishop, M. (2004), Introduction to Computer Security, Addison-Wesley Professional, Upper Saddle River, NJ.
    • (2004) Introduction to Computer Security
    • Bishop, M.1
  • 9
    • 80054035972 scopus 로고    scopus 로고
    • Cyber threat landscape faced by financial and insurance industry
    • Choo, K.K.R. (2010), "Cyber threat landscape faced by financial and insurance industry", Trends & Issues in Crime and Criminal Justice, Vol. 408, pp. 1-6.
    • (2010) Trends & Issues in Crime and Criminal Justice , vol.408 , pp. 1-6
    • Choo, K.K.R.1
  • 10
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • Choo, K.K.R. (2011), "The cyber threat landscape: challenges and future research directions", Computers & Security, Vol. 30 No. 8, pp. 719-731.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.K.R.1
  • 14
    • 84893657913 scopus 로고    scopus 로고
    • accessed June 27, 2012
    • Domain (2011), Security Center Fradulent Ads, available at: www.domain.com.au/public/SecurityPolicy.aspx (accessed June 27, 2012).
    • (2011) Security Center Fradulent Ads
  • 15
    • 36148943853 scopus 로고    scopus 로고
    • Compliance obstacles to competitiveness
    • Doyle, E. (2007), "Compliance obstacles to competitiveness", Corporate Governance, Vol. 7, pp. 612-622.
    • (2007) Corporate Governance , vol.7 , pp. 612-622
    • Doyle, E.1
  • 17
    • 84893667208 scopus 로고    scopus 로고
    • accessed July 6, 2012
    • Griffith, C. (2011), "Laptop thieves foiled by remote tracing", The Australian, available at: www.theaustralian.com.au/australian-it/laptop- burglars-foiled-by-remote-tracing/story-e6frga kx-1226130051740 (accessed July 6, 2012).
    • (2011) Laptop Thieves Foiled by Remote Tracing
    • Griffith, C.1
  • 18
    • 84875598792 scopus 로고    scopus 로고
    • Between hype and understatement: Reassessing cyber risks as a security strategy
    • Guinchard, A. (2011), "Between hype and understatement: reassessing cyber risks as a security strategy", Journal of Strategic Security, Vol. 4 No. 2, pp. 75-96.
    • (2011) Journal of Strategic Security , vol.4 , Issue.2 , pp. 75-96
    • Guinchard, A.1
  • 20
    • 80052818132 scopus 로고    scopus 로고
    • Risk assessment for mobile devices
    • Furnell, S., Lambrinoudakis, C. and Pernul, G. (Eds), LNCS, Springer, Berlin
    • Lederm, T. and Clarke, N. (2011), "Risk assessment for mobile devices", in Furnell, S., Lambrinoudakis, C. and Pernul, G. (Eds), Trust, Privacy and Security in Digital Business, LNCS 6863, Springer, Berlin, pp. 210-221.
    • (2011) Trust, Privacy and Security in Digital Business , vol.6863 , pp. 210-221
    • Lederm, T.1    Clarke, N.2
  • 21
    • 84867375385 scopus 로고    scopus 로고
    • BYOD: Security and privacy considerations
    • Miller, K.W., Voas, J. and Hurlburt, G.F. (2012), "BYOD: security and privacy considerations", IT Professional, Vol. 14 No. 5, pp. 53-55.
    • (2012) IT Professional , vol.14 , Issue.5 , pp. 53-55
    • Miller, K.W.1    Voas, J.2    Hurlburt, G.F.3
  • 22
    • 84893659236 scopus 로고    scopus 로고
    • accessed September 28, 2012
    • Mobius (2010), Data Assets and Network Security Insurance, available at: http://mobiusund.com.au/downloads/Mobius%20Cyber%20-%20DANSI%20- %20website%20version.pdf (accessed September 28, 2012).
    • (2010) Data Assets and Network Security Insurance
  • 23
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick, D. and Choo, K.-K.R. (2013a), "Digital droplets: Microsoft SkyDrive forensic data remnants", Future Generation Computer Systems, Vol. 23 No. 3, pp. 1378-1394.
    • (2013) Future Generation Computer Systems , vol.23 , Issue.3 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 24
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • Quick, D. and Choo, K.-K.R. (2013b), "Dropbox analysis: data remnants on user machines", Digital Investigation, Vol. 10 No. 1, pp. 3-18, available at: http://dx.doi.org/10.1016/j.diin.2013.02.003
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 28
    • 84869141956 scopus 로고    scopus 로고
    • accessed June 26, 12
    • Verizon (2012), Data Breach Investigations Report, available at:www.verizonbusiness.com/resources/reports/rp-data-breach-investigations- report-2012-en-xg.pdf (accessed June 26, 12).
    • (2012) Data Breach Investigations Report


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.