메뉴 건너뛰기




Volumn 5, Issue , 2013, Pages 4702-4719

What, I shouldn't have done that?: The influence of training and just-in-time reminders on secure behavior

Author keywords

Dual task interference; IS security; Reminders; Security education training and awareness programs; Theory of planned behavior

Indexed keywords

AWARENESS PROGRAM; DUAL-TASK INTERFERENCE; IS SECURITY; REMINDERS; THEORY OF PLANNED BEHAVIOR;

EID: 84897765078     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (26)

References (74)
  • 1
    • 77957045434 scopus 로고    scopus 로고
    • Detecting Fake Websites: The Contribution of Statistical Learning Theory
    • Abbasi, A., Zhang, Z., Zimbra, D., Chen, H., and Nunamaker Jr., J.F. 2010. "Detecting Fake Websites: The Contribution of Statistical Learning Theory, " MIS Quarterly (34:3), pp. 435-461.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 435-461
    • Abbasi, A.1    Zhang, Z.2    Zimbra, D.3    Chen, H.4    Nunamaker Jr., J.F.5
  • 2
  • 3
    • 0002305454 scopus 로고
    • From Intentions to Actions: A Theory of Planned Behavior
    • in, J. Kuhl and J. Beckman (eds.). Heidelberg: Springer
    • Ajzen, I. 1985. "From Intentions to Actions: A Theory of Planned Behavior, " in Action-Control: From Cognition to Behavior, J. Kuhl and J. Beckman (eds.). Heidelberg: Springer, pp. 11-39.
    • (1985) Action-Control: From Cognition to Behavior , pp. 11-39
    • Ajzen, I.1
  • 5
    • 0039869164 scopus 로고
    • Attitudinal and Normative Variables as Predictors of Specific Behavior
    • Ajzen, I., and Fishbein, M. 1973. "Attitudinal and Normative Variables as Predictors of Specific Behavior, " Journal of Personality and Social Psychology (17:1), pp. 41-57.
    • (1973) Journal of Personality and Social Psychology , vol.17 , Issue.1 , pp. 41-57
    • Ajzen, I.1    Fishbein, M.2
  • 7
    • 41649112685 scopus 로고
    • Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach
    • Anderson, J.C., and Gerbing, D.W. 1988. "Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach, " Psychological Bulletin (103:3), pp. 411-423.
    • (1988) Psychological Bulletin , vol.103 , Issue.3 , pp. 411-423
    • Anderson, J.C.1    Gerbing, D.W.2
  • 8
    • 0000106003 scopus 로고
    • Regulation of Cognitive Processes through Perceived Self-Efficacy
    • Bandura, A. 1989. "Regulation of Cognitive Processes through Perceived Self-Efficacy, " Developmental Psychology (25:5), pp. 729-735.
    • (1989) Developmental Psychology , vol.25 , Issue.5 , pp. 729-735
    • Bandura, A.1
  • 9
    • 0000534580 scopus 로고
    • Use of Path Analysis in Industrial/Organizational Psychology: Criticisms and Suggestions
    • Billings, R.S., and Wroten, S.P. 1978. "Use of Path Analysis in Industrial/Organizational Psychology: Criticisms and Suggestions, " Journal of Applied Psychology (63:3), pp. 677-688.
    • (1978) Journal of Applied Psychology , vol.63 , Issue.3 , pp. 677-688
    • Billings, R.S.1    Wroten, S.P.2
  • 10
    • 84864439174 scopus 로고    scopus 로고
    • Visual Mental Image Generation Does Not Overlap with Visual Short-Term Memory: A Dual-Task Interference Study
    • Borst, G., Niven, E., and Logie, R.H. 2012. "Visual Mental Image Generation Does Not Overlap with Visual Short-Term Memory: A Dual-Task Interference Study, " Memory & Cognition (40:3), pp. 360-372.
    • (2012) Memory & Cognition , vol.40 , Issue.3 , pp. 360-372
    • Borst, G.1    Niven, E.2    Logie, R.H.3
  • 11
    • 67650100804 scopus 로고    scopus 로고
    • If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security
    • Boss, S., Kirsch, L., Angermeier, I., Shingler, R., and Boss, R. 2009. "If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness, Control, and Information Security, " European Journal of Information Systems (18:2), pp. 151-164.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 151-164
    • Boss, S.1    Kirsch, L.2    Angermeier, I.3    Shingler, R.4    Boss, R.5
  • 12
    • 80052795867 scopus 로고    scopus 로고
    • Improving Computer Security Dialogs
    • in, P. Campos, N. Graham, J. Jorge, N. Nunes, P. Palanque and M. Winckler (eds.). Springer Berlin Heidelberg
    • Bravo-Lillo, C., Cranor, L., Downs, J., Komanduri, S., and Sleeper, M. 2011. "Improving Computer Security Dialogs, " in Human-Computer Interaction-Interact 2011, P. Campos, N. Graham, J. Jorge, N. Nunes, P. Palanque and M. Winckler (eds.). Springer Berlin Heidelberg, pp. 18-35.
    • (2011) Human-Computer Interaction-Interact 2011 , pp. 18-35
    • Bravo-Lillo, C.1    Cranor, L.2    Downs, J.3    Komanduri, S.4    Sleeper, M.5
  • 14
    • 77957061746 scopus 로고    scopus 로고
    • Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness, " MIS Quarterly (34:3), pp. 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 16
    • 84992963195 scopus 로고    scopus 로고
    • Raising Information Security Awareness in the Academic Setting
    • Cox, A., Connolly, S., and Currall, J. 2001. "Raising Information Security Awareness in the Academic Setting, " VINE (31:2), pp. 11-16.
    • (2001) VINE , vol.31 , Issue.2 , pp. 11-16
    • Cox, A.1    Connolly, S.2    Currall, J.3
  • 17
    • 84893108843 scopus 로고    scopus 로고
    • A Framework for Reasoning About the Human in the Loop
    • in:, San Francisco, California: USENIX Association
    • Cranor, L.F. 2008. "A Framework for Reasoning About the Human in the Loop, " in: Proceedings of the 1st Conference on Usability, Psychology, and Security. San Francisco, California: USENIX Association, pp. 1-15.
    • (2008) Proceedings of the 1st Conference on Usability, Psychology, and Security , pp. 1-15
    • Cranor, L.F.1
  • 18
    • 84897780890 scopus 로고    scopus 로고
    • The Effects of Security Education Training and Awareness Programs and Individual Characteristics on End User Security Tool Usage
    • Crossler, R.E., and Belanger, F. 2009. "The Effects of Security Education Training and Awareness Programs and Individual Characteristics on End User Security Tool Usage, " Journal of Information Systems Security (5:3), pp. 3-22.
    • (2009) Journal of Information Systems Security , vol.5 , Issue.3 , pp. 3-22
    • Crossler, R.E.1    Belanger, F.2
  • 19
    • 67649551429 scopus 로고    scopus 로고
    • User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
    • Mar
    • D'Arcy, J., Hovav, A., and Galletta, D. 2009. "User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach, " Information Systems Research (20:1), Mar, pp. 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 20
    • 2442463419 scopus 로고    scopus 로고
    • Conducting Experimental Research in Information Systems
    • Dennis, A.R., and Valacich, J.S. 2001. "Conducting Experimental Research in Information Systems, " Communications of AIS (7:5), pp. 1-41.
    • (2001) Communications of AIS , vol.7 , Issue.5 , pp. 1-41
    • Dennis, A.R.1    Valacich, J.S.2
  • 22
    • 84897805615 scopus 로고    scopus 로고
    • Health Insurance Reform: Security Standards; Final Rule
    • Department of Health and Human Services, in:, Federal Register
    • Department of Health and Human Services. 2003. "Health Insurance Reform: Security Standards; Final Rule, " in: 45 CFR Parts 160, 162, and 164. Federal Register.
    • (2003) 45 CFR Parts 160, 162, and 164
  • 23
    • 49049114397 scopus 로고    scopus 로고
    • The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies
    • Dinev, T., and Hu, Q. 2007. "The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies, " Journal of the Association for Information Systems (8:7), pp. 386-408.
    • (2007) Journal of the Association for Information Systems , vol.8 , Issue.7 , pp. 386-408
    • Dinev, T.1    Hu, Q.2
  • 24
  • 25
    • 33845400993 scopus 로고    scopus 로고
    • Isolation of a Central Bottleneck of Information Processing with Time-Resolved Fmri
    • Dux, P.E., Ivanoff, J., Asplund, C.L., and Marois, R. 2006. "Isolation of a Central Bottleneck of Information Processing with Time-Resolved Fmri, " Neuron (52:6), pp. 1109-1120.
    • (2006) Neuron , vol.52 , Issue.6 , pp. 1109-1120
    • Dux, P.E.1    Ivanoff, J.2    Asplund, C.L.3    Marois, R.4
  • 27
    • 0000009769 scopus 로고
    • Evaluating Structural Equation Models with Unobservable Variables and Measurement Error
    • Fornell, C., and Larcker, D.F. 1981. "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error, " Journal of Marketing Research (18:1), pp. 39-50.
    • (1981) Journal of Marketing Research , vol.18 , Issue.1 , pp. 39-50
    • Fornell, C.1    Larcker, D.F.2
  • 28
    • 75549087484 scopus 로고    scopus 로고
    • Dual-Task Interference in Visual Working Memory: A Limitation in Storage Capacity but Not in Encoding or Retrieval
    • Fougnie, D., and Marois, R. 2009. "Dual-Task Interference in Visual Working Memory: A Limitation in Storage Capacity but Not in Encoding or Retrieval, " Attention, Perception, & Psychophysics (71:8), pp. 1831-1841.
    • (2009) Attention, Perception, & Psychophysics , vol.71 , Issue.8 , pp. 1831-1841
    • Fougnie, D.1    Marois, R.2
  • 29
    • 33645589662 scopus 로고    scopus 로고
    • A Prototype Tool for Information Security Awareness and Training
    • Furnell, S., Gennatou, M., and Dowland, P. 2002. "A Prototype Tool for Information Security Awareness and Training, " Logistics Information Management (15:5/6), pp. 352-357.
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 352-357
    • Furnell, S.1    Gennatou, M.2    Dowland, P.3
  • 30
    • 0000384380 scopus 로고
    • The College Sophomore as a Guinea Pig: Setting the Record Straight
    • Greenburg, J. 1987. "The College Sophomore as a Guinea Pig: Setting the Record Straight, " Academy of Management Review (12:1), pp. 157-159.
    • (1987) Academy of Management Review , vol.12 , Issue.1 , pp. 157-159
    • Greenburg, J.1
  • 31
    • 33847080358 scopus 로고    scopus 로고
    • Research Note: Individual Cognition and Dual-Task Interference in Group Support Systems
    • Heninger, W.G., Dennis, A.R., and Hilmer, K.M.N. 2006. "Research Note: Individual Cognition and Dual-Task Interference in Group Support Systems, " Information Systems Research (17:4), pp. 415-424.
    • (2006) Information Systems Research , vol.17 , Issue.4 , pp. 415-424
    • Heninger, W.G.1    Dennis, A.R.2    Hilmer, K.M.N.3
  • 32
    • 84897746857 scopus 로고    scopus 로고
    • Retrieved January 30, 2013, from
    • Herold, R. 2009. "Common Infosec & Privacy Training Mistakes. " Retrieved January 30, 2013, from http://privacyguidance.com/blog/2009/06/01/common-infosec-privacy-training-mistakes/
    • (2009) Common Infosec & Privacy Training Mistakes
    • Herold, R.1
  • 33
    • 70349265955 scopus 로고    scopus 로고
    • Dual-Task Interference: Attentional and Neurophysiological Influences
    • Hiraga, C.Y., Garry, M.I., Carson, R.G., and Summers, J.J. 2009. "Dual-Task Interference: Attentional and Neurophysiological Influences, " Behavioural Brain Research (205:1), pp. 10-18.
    • (2009) Behavioural Brain Research , vol.205 , Issue.1 , pp. 10-18
    • Hiraga, C.Y.1    Garry, M.I.2    Carson, R.G.3    Summers, J.J.4
  • 34
    • 0020985537 scopus 로고
    • Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft
    • Hollinger, R.C., and Clark, J.P. 1983. "Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft, " Social Forces (62:2), pp. 398-418.
    • (1983) Social Forces , vol.62 , Issue.2 , pp. 398-418
    • Hollinger, R.C.1    Clark, J.P.2
  • 35
    • 84859105508 scopus 로고    scopus 로고
    • Does Culture Really Matter? A Cross-Cultural Analysis of Security Countermeasure Effectiveness Based on Deterrence Theory
    • Hovav, A., and D'Arcy, J. 2012. "Does Culture Really Matter? A Cross-Cultural Analysis of Security Countermeasure Effectiveness Based on Deterrence Theory, " Information & Management (49:2), pp. 99-110.
    • (2012) Information & Management , vol.49 , Issue.2 , pp. 99-110
    • Hovav, A.1    D'Arcy, J.2
  • 36
    • 84857931598 scopus 로고    scopus 로고
    • Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior
    • Maui, Hawaii: IEEE
    • Jenkins, J.L., Durcikova, A., and Burns, M.B. 2012. "Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior, " 45th Hawaii International Conference on System Science (HICSS), Maui, Hawaii: IEEE, pp. 3288-3296.
    • (2012) 45th Hawaii International Conference on System Science (HICSS) , pp. 3288-3296
    • Jenkins, J.L.1    Durcikova, A.2    Burns, M.B.3
  • 37
    • 84887446180 scopus 로고    scopus 로고
    • Simplicity Is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior
    • Jenkins, J.L., Durcikova, A., and Burns, M.B. 2013a. "Simplicity Is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior, " Journal of Organizational and End User Computing (JOEUC) (25:3), pp. 52-66.
    • (2013) Journal of Organizational and End User Computing (JOEUC) , vol.25 , Issue.3 , pp. 52-66
    • Jenkins, J.L.1    Durcikova, A.2    Burns, M.B.3
  • 38
    • 84870959774 scopus 로고    scopus 로고
    • Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior
    • Saint Louis, Missouri
    • Jenkins, J.L., Durcikova, A., Ross, G., and Nunamaker Jr, J.F. 2010. "Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior, " ICIS, Saint Louis, Missouri.
    • (2010) ICIS
    • Jenkins, J.L.1    Durcikova, A.2    Ross, G.3    Nunamaker Jr., J.F.4
  • 39
    • 84897710199 scopus 로고    scopus 로고
    • Improving Password Cybersecurity through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals
    • Jenkins, J.L., Grimes, M., Proudfoot, J.G., and Lowry, P.B. 2013b. "Improving Password Cybersecurity through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals, " Information Technology for Development, pp. 1-18.
    • (2013) Information Technology for Development , pp. 1-18
    • Jenkins, J.L.1    Grimes, M.2    Proudfoot, J.G.3    Lowry, P.B.4
  • 40
    • 80052902327 scopus 로고    scopus 로고
    • Toward a New Meta-Theory for Designing Information Systems (Is) Security Training Approaches
    • Karjalainen, M., and Siponen, M. 2011. "Toward a New Meta-Theory for Designing Information Systems (Is) Security Training Approaches, " Journal of the Association for Information Systems (12:8), pp. 518-555.
    • (2011) Journal of the Association for Information Systems , vol.12 , Issue.8 , pp. 518-555
    • Karjalainen, M.1    Siponen, M.2
  • 42
    • 84555162741 scopus 로고    scopus 로고
    • Retrieved January 10, 2012, from
    • Kenny, D. 2011. "Path Analysis. " Retrieved January 10, 2012, from http://davidakenny.net/cm/pathanal.htm
    • (2011) Path Analysis
    • Kenny, D.1
  • 43
    • 70350605916 scopus 로고    scopus 로고
    • Adaptive Security Dialogs for Improved Security Behavior of Users
    • in, T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P. Palanque, R. Prates and M. Winckler (eds.). Springer Berlin Heidelberg
    • Keukelaere, F., Yoshihama, S., Trent, S., Zhang, Y., Luo, L., and Zurko, M. 2009. "Adaptive Security Dialogs for Improved Security Behavior of Users, " in Human-Computer Interaction-Interact 2009, T. Gross, J. Gulliksen, P. Kotzé, L. Oestreicher, P. Palanque, R. Prates and M. Winckler (eds.). Springer Berlin Heidelberg, pp. 510-523.
    • (2009) Human-Computer Interaction-Interact 2009 , pp. 510-523
    • Keukelaere, F.1    Yoshihama, S.2    Trent, S.3    Zhang, Y.4    Luo, L.5    Zurko, M.6
  • 44
    • 62949223304 scopus 로고    scopus 로고
    • The Role of Crosstalk in Dual-Task Performance: Evidence from Manipulating Response-Code Overlap
    • Koch, I. 2009. "The Role of Crosstalk in Dual-Task Performance: Evidence from Manipulating Response-Code Overlap, " Psychological Research (73:3), pp. 417-424.
    • (2009) Psychological Research , vol.73 , Issue.3 , pp. 417-424
    • Koch, I.1
  • 45
    • 19544390006 scopus 로고    scopus 로고
    • Capacity Limits of Information Processing in the Brain
    • Marois, R., and Ivanoff, J. 2005. "Capacity Limits of Information Processing in the Brain, " Trends in Cognitive Sciences (9:6), pp. 296-305.
    • (2005) Trends in Cognitive Sciences , vol.9 , Issue.6 , pp. 296-305
    • Marois, R.1    Ivanoff, J.2
  • 46
    • 84886517444 scopus 로고    scopus 로고
    • The Effects of Information Disclosure Policy on the Diffusion of Security Attacks
    • Orlando, Florida
    • Mitra, S., and Ransbotham, S. 2012. "The Effects of Information Disclosure Policy on the Diffusion of Security Attacks, " ICIS, Orlando, Florida.
    • (2012) ICIS
    • Mitra, S.1    Ransbotham, S.2
  • 47
    • 84864567494 scopus 로고    scopus 로고
    • Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats
    • Australia: School of Computer and Information Science, Edith Cowan University
    • Molok, N.N.A., Chang, S., and Ahmad, A. 2010. "Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats, " Australian Information Security Management Conference, Australia: School of Computer and Information Science, Edith Cowan University, pp. 70-80.
    • (2010) Australian Information Security Management Conference , pp. 70-80
    • Molok, N.N.A.1    Chang, S.2    Ahmad, A.3
  • 48
    • 73849124985 scopus 로고
    • Running Corporate and National Security Awareness Programs
    • Amsterdam: North-Holland Publishing Co
    • Murray, B. 1991. "Running Corporate and National Security Awareness Programs, " IFIP TC11 Seventh International Conference on IS Security, Amsterdam: North-Holland Publishing Co., pp. 203-207.
    • (1991) IFIP TC11 Seventh International Conference on IS Security , pp. 203-207
    • Murray, B.1
  • 49
    • 20344386485 scopus 로고    scopus 로고
    • Just-in-Time Evidence-Based E-Mail "Reminders" in Home Health Care: Impact on Nurse Practices
    • Murtaugh, C.M., Pezzin, L.E., McDonald, M.V., Feldman, P.H., and Peng, T.R. 2005. "Just-in-Time Evidence-Based E-Mail "Reminders" in Home Health Care: Impact on Nurse Practices, " Health Services Research (40:3), pp. 849-864.
    • (2005) Health Services Research , vol.40 , Issue.3 , pp. 849-864
    • Murtaugh, C.M.1    Pezzin, L.E.2    McDonald, M.V.3    Feldman, P.H.4    Peng, T.R.5
  • 51
    • 0036583139 scopus 로고    scopus 로고
    • Queuing or Sharing? A Critical Evaluation of the Single-Bottleneck Notion
    • Navon, D., and Miller, J. 2002. "Queuing or Sharing? A Critical Evaluation of the Single-Bottleneck Notion, " Cognitive Psychology (44:3), pp. 193-251.
    • (2002) Cognitive Psychology , vol.44 , Issue.3 , pp. 193-251
    • Navon, D.1    Miller, J.2
  • 52
    • 0025515637 scopus 로고
    • Do Response Modality Effects Support Multiprocessor Models of Divided Attention?
    • Pashler, H. 1990. "Do Response Modality Effects Support Multiprocessor Models of Divided Attention?, " Journal of Experimental Psychology: Human Perception and Performance (16:4), pp. 826-842.
    • (1990) Journal of Experimental Psychology: Human Perception and Performance , vol.16 , Issue.4 , pp. 826-842
    • Pashler, H.1
  • 53
    • 0028502653 scopus 로고
    • Dual-Task Interference in Simple Tasks: Data and Theory
    • Pashler, H. 1994. "Dual-Task Interference in Simple Tasks: Data and Theory, " Psychological Bulletin (116:2), pp. 220-244.
    • (1994) Psychological Bulletin , vol.116 , Issue.2 , pp. 220-244
    • Pashler, H.1
  • 55
    • 80155212119 scopus 로고    scopus 로고
    • Effects of Dual Task Interference on Memory Intrusions for Affective Images
    • Pearson, D.G., and Sawyer, T. 2011. "Effects of Dual Task Interference on Memory Intrusions for Affective Images, " International Journal of Cognitive Therapy (4:2), pp. 122-133.
    • (2011) International Journal of Cognitive Therapy , vol.4 , Issue.2 , pp. 122-133
    • Pearson, D.G.1    Sawyer, T.2
  • 56
    • 78650770842 scopus 로고    scopus 로고
    • Improving Employees' Compliance through Information Systems Security Training: An Action Research Study
    • Dec
    • Puhakainen, P., and Siponen, M. 2010. "Improving Employees' Compliance through Information Systems Security Training: An Action Research Study, " MIS Quarterly (34:4), Dec, pp. 757-778.
    • (2010) MIS Quarterly , vol.34 , Issue.4 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 58
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'Weakest Link': A Human/Computer Interaction Approach to Usable and Effective Security
    • Sasse, M.A., Brostoff, S., and Weirich, D. 2001. "Transforming the 'Weakest Link': A Human/Computer Interaction Approach to Usable and Effective Security, " BT Technology Journal (19:3), pp. 122-131.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 59
    • 84865622297 scopus 로고    scopus 로고
    • Retrieved January 30, 2013, from
    • Schneier, B. 2005. "Insider Threat Statistics. " Retrieved January 30, 2013, from http://www.schneier.com/blog/archives/2005/12/insider_threat.html
    • (2005) Insider Threat Statistics
    • Schneier, B.1
  • 60
    • 33744808509 scopus 로고    scopus 로고
    • The Role of Cognitive Fit in the Relationship between Software Comprehension and Modification
    • Shaft, T.M., and Vessey, I. 2006. "The Role of Cognitive Fit in the Relationship between Software Comprehension and Modification, " MIS Quarterly (30:1), pp. 29-55.
    • (2006) MIS Quarterly , vol.30 , Issue.1 , pp. 29-55
    • Shaft, T.M.1    Vessey, I.2
  • 61
    • 33745899916 scopus 로고    scopus 로고
    • Dynamics of the Central Bottleneck: Dual-Task and Task Uncertainty
    • Sigman, M., and Dehaene, S. 2006. "Dynamics of the Central Bottleneck: Dual-Task and Task Uncertainty, " PLoS Biology (4:7), p. e220.
    • (2006) PLoS Biology , vol.4 , Issue.7
    • Sigman, M.1    Dehaene, S.2
  • 62
    • 0033683516 scopus 로고    scopus 로고
    • A Conceptual Foundation for Organizational Information Security Awareness
    • Siponen, M. 2000. "A Conceptual Foundation for Organizational Information Security Awareness, " Information Management & Computer Security (8:1), pp. 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, M.1
  • 63
    • 71149100808 scopus 로고    scopus 로고
    • Are Employees Putting Your Company at Risk by Not Following Information Security Policies?
    • Siponen, M., Mahmood, M.A., and Pahnila, S. 2009. "Are Employees Putting Your Company at Risk by Not Following Information Security Policies?, " Communications of the ACM (52:12), pp. 145-147.
    • (2009) Communications of the ACM , vol.52 , Issue.12 , pp. 145-147
    • Siponen, M.1    Mahmood, M.A.2    Pahnila, S.3
  • 65
    • 0000819688 scopus 로고
    • Cognitive Load During Problem Solving: Effects on Learning
    • Sweller, J. 1988. "Cognitive Load During Problem Solving: Effects on Learning, " Cognitive Science (12:2), pp. 257-285.
    • (1988) Cognitive Science , vol.12 , Issue.2 , pp. 257-285
    • Sweller, J.1
  • 66
    • 73549120882 scopus 로고
    • Understanding Information Technology Usage-a Test of Competing Models
    • Jun
    • Taylor, S., and Todd, P.A. 1995. "Understanding Information Technology Usage-a Test of Competing Models, " Information Systems Research (6:2), Jun, pp. 144-176.
    • (1995) Information Systems Research , vol.6 , Issue.2 , pp. 144-176
    • Taylor, S.1    Todd, P.A.2
  • 67
    • 0002527556 scopus 로고
    • The Refractory Phase of Voluntary and Associative Responses
    • Telford, C.W. 1931. "The Refractory Phase of Voluntary and Associative Responses, " Journal of Experimental Psychology (14:1), pp. 1-36.
    • (1931) Journal of Experimental Psychology , vol.14 , Issue.1 , pp. 1-36
    • Telford, C.W.1
  • 68
    • 84897746858 scopus 로고    scopus 로고
    • An Effective Is Security Awareness Program for Industry
    • L. Yngström and J. Carlsen (eds.), London: Chapman and Hall
    • Thomson, M.E., and Solms, R. 1997. "An Effective Is Security Awareness Program for Industry, " IFIP TC 11 13th International Conference on IS Security, L. Yngström and J. Carlsen (eds.), London: Chapman and Hall.
    • (1997) IFIP TC 11 13th International Conference on IS Security
    • Thomson, M.E.1    Solms, R.2
  • 70
    • 77954171061 scopus 로고    scopus 로고
    • Task Switching: Interplay of Reconfiguration and Interference Control
    • Vandierendonck, A., Liefooghe, B., and Verbruggen, F. 2010. "Task Switching: Interplay of Reconfiguration and Interference Control, " Psychological Bulletin (136:4), p. 601.
    • (2010) Psychological Bulletin , vol.136 , Issue.4 , pp. 601
    • Vandierendonck, A.1    Liefooghe, B.2    Verbruggen, F.3
  • 71
    • 2342475711 scopus 로고    scopus 로고
    • Towards Information Security Behavioural Compliance
    • May
    • Vroom, C., and von Solms, R. 2004. "Towards Information Security Behavioural Compliance, " Computers & Security (23:3), May, pp. 191-198.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    von Solms, R.2
  • 72
    • 79955622246 scopus 로고    scopus 로고
    • The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention
    • Warkentin, M., Johnston, A.C., and Shropshire, J. 2011. "The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention, " European Journal of Information Systems (20:3), pp. 267-284.
    • (2011) European Journal of Information Systems , vol.20 , Issue.3 , pp. 267-284
    • Warkentin, M.1    Johnston, A.C.2    Shropshire, J.3
  • 73
    • 42149161709 scopus 로고    scopus 로고
    • The Psychology of Security
    • West, R. 2008. "The Psychology of Security, " Communications of the ACM (51:4), pp. 34-40.
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 34-40
    • West, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.