메뉴 건너뛰기




Volumn 42, Issue , 2014, Pages 56-65

Smartphone information security awareness: A victim of operational pressures

Author keywords

Awareness; Bring your own device (BYOD); Information security; Mobile computing; Smartphone

Indexed keywords

COMPUTATION THEORY; HUMAN RESOURCE MANAGEMENT; MOBILE COMPUTING; SECURITY OF DATA; SMARTPHONES;

EID: 84894212054     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.01.005     Document Type: Article
Times cited : (64)

References (21)
  • 1
    • 77951204516 scopus 로고    scopus 로고
    • Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
    • E. Albrechsten, and J. Hovden Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study Comput Secur 29 1 2010 432 445
    • (2010) Comput Secur , vol.29 , Issue.1 , pp. 432-445
    • Albrechsten, E.1    Hovden, J.2
  • 2
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • DOI 10.1016/j.cose.2006.11.004, PII S0167404806002033
    • E. Albrechtsen Qualitative study of users' view on information security Comput Secur 26 1 2007 276 289 (Pubitemid 46873753)
    • (2007) Computers and Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 4
    • 63049091681 scopus 로고    scopus 로고
    • From desktop to mobile: Examining the security experience
    • R. Botha, S. Furnell, and N. Clarke From desktop to mobile: examining the security experience Comput Secur 28 3-4 2009 130 137
    • (2009) Comput Secur , vol.28 , Issue.34 , pp. 130-137
    • Botha, R.1    Furnell, S.2    Clarke, N.3
  • 5
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • B. Bulgurcu, H. Cavusoglu, and I. Benbasat Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness MIS Q 34 3 2010 523 548
    • (2010) MIS Q , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 6
    • 79955442931 scopus 로고    scopus 로고
    • Smart security
    • T. Caldwell Smart security Netw Secur 9 1 2011 5 9
    • (2011) Netw Secur , vol.9 , Issue.1 , pp. 5-9
    • Caldwell, T.1
  • 7
    • 84894129752 scopus 로고    scopus 로고
    • Retrieved from Cisco mConcierge
    • Cisco BYOD insights 2013 2013, March Retrieved from Cisco mConcierge: http://www.ciscomcon.com/sw/swchannel/registration/internet/registration.cfm? SWAPPID=91&RegPageID=350200&SWTHEMEID=12949
    • (2013) BYOD Insights 2013
    • Cisco1
  • 8
    • 77956620263 scopus 로고    scopus 로고
    • The positive outcomes of information security awareness training in companies a case study
    • M. Eminagaoglu, E. Ucar, and S. Eren The positive outcomes of information security awareness training in companies:- a case study Inf Secur Tech Rep 14 1 2009 223 229
    • (2009) Inf Secur Tech Rep , vol.14 , Issue.1 , pp. 223-229
    • Eminagaoglu, M.1    Ucar, E.2    Eren, S.3
  • 9
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • DOI 10.1016/j.cose.2006.02.008, PII S0167404806000563
    • H. Kruger, and W. Kearney A prototype for assessing information security awareness Comput Secur 25 1 2006 289 296 (Pubitemid 44202198)
    • (2006) Computers and Security , vol.25 , Issue.4 , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 11
    • 84894109655 scopus 로고    scopus 로고
    • Managing and securing business networks in the smartphone era
    • Paper 5 Sam Houston State University Huntsville
    • S. Mahesh, and A. Hooter Managing and securing business networks in the smartphone era Paper 5 Annual general business conference 2013 Sam Houston State University Huntsville 1 17
    • (2013) Annual General Business Conference , pp. 1-17
    • Mahesh, S.1    Hooter, A.2
  • 12
    • 84879164107 scopus 로고    scopus 로고
    • Q & A: Colin Tankard - Raising security awareness
    • S. Mansfield Q & A: Colin Tankard - raising security awareness Netw Secur 2013 6 2013, June 16 19
    • (2013) Netw Secur , vol.2013 , Issue.6 , pp. 16-19
    • Mansfield, S.1
  • 13
    • 84891843335 scopus 로고    scopus 로고
    • Delegate the smartphone users? Security awareness in smartphone platforms
    • A. Mylonas, A. Kastania, and D. Gritzalis Delegate the smartphone users? Security awareness in smartphone platforms Comput Secur 34 1 2013 47 66
    • (2013) Comput Secur , vol.34 , Issue.1 , pp. 47-66
    • Mylonas, A.1    Kastania, A.2    Gritzalis, D.3
  • 14
    • 84888864676 scopus 로고    scopus 로고
    • Ponemon Institute LLC Traverse City, Michigan
    • Ponemon Institute 2013 state of the endpoint 2012 Ponemon Institute LLC Traverse City, Michigan
    • (2012) 2013 State of the Endpoint
    • Institute, P.1
  • 16
    • 3142720692 scopus 로고    scopus 로고
    • Retrieved 30.07.12from:http://www.pwc.co.uk/audit-assurance/publications/ uk-information-security-breaches-survey-results-2012.jhtml
    • PricewaterhouseCoopers Information security breaches survey 2012, April Retrieved 30.07.12, from: http://www.pwc.co.uk http://www.pwc.co.uk/audit- assurance/publications/uk-information-security-breaches-survey-results-2012. jhtml
    • (2012) Information Security Breaches Survey
    • Pricewaterhousecoopers1
  • 17
    • 0031279121 scopus 로고    scopus 로고
    • Risk management in a dynamic society: A modelling problem
    • DOI 10.1016/S0925-7535(97)00052-0, PII S0925753597000520
    • J. Rasmussen Risk management in a dynamic society: a modelling problem Saftey Sci 27 2 1997 183 213 (Pubitemid 28020542)
    • (1997) Safety Science , vol.27 , Issue.2-3 , pp. 183-213
    • Rasmussen, J.1
  • 19
    • 73149086369 scopus 로고
    • An outline of general system theory
    • L. Von Bertalanffy An outline of general system theory Br J Phil Sci 1 2 1950 134 165
    • (1950) Br J Phil Sci , vol.1 , Issue.2 , pp. 134-165
    • Von Bertalanffy, L.1
  • 20
    • 84861648347 scopus 로고    scopus 로고
    • Validation of theory: Exploring and reframing poppers worlds
    • S. Wallis Validation of theory: exploring and reframing poppers worlds Integral Rev 4 2 2008 71 91
    • (2008) Integral Rev , vol.4 , Issue.2 , pp. 71-91
    • Wallis, S.1
  • 21
    • 84862276983 scopus 로고    scopus 로고
    • Evaluating and developing theories in the information systems discipline
    • R. Weber Evaluating and developing theories in the information systems discipline J Assoc Inf Syst 13 1 2012 1 30
    • (2012) J Assoc Inf Syst , vol.13 , Issue.1 , pp. 1-30
    • Weber, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.