메뉴 건너뛰기




Volumn 22, Issue 4, 2014, Pages 334-345

A study of information security awareness in Australian government organisations

Author keywords

Information risk; Information security (InfoSec); InfoSec awareness; InfoSec behaviour; InfoSec vulnerabilities

Indexed keywords

HUMAN RESOURCE MANAGEMENT; RISK ASSESSMENT; SOCIAL SCIENCES COMPUTING; SURVEYS;

EID: 84897915329     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/IMCS-10-2013-0078     Document Type: Article
Times cited : (46)

References (19)
  • 1
    • 0022916427 scopus 로고
    • Health promotion and the knowledge-attitude-behavior continuum
    • Bettinghaus, E.P. (1986), "Health promotion and the knowledge-attitude-behavior continuum", Preventive Medicine, Vol. 15 No. 5, pp. 475-491.
    • (1986) Preventive Medicine , vol.15 , Issue.5 , pp. 475-491
    • Bettinghaus, E.P.1
  • 2
    • 65049090177 scopus 로고    scopus 로고
    • Using the case method to teach online classes: Promoting Socratic dialogue and critical thinking skills
    • Brooke, S.L. (2006), "Using the case method to teach online classes: promoting Socratic dialogue and critical thinking skills", International Journal of Teaching and Learning in Higher Education, Vol. 18 No. 2, pp. 142-149.
    • (2006) International Journal of Teaching and Learning in Higher Education , vol.18 , Issue.2 , pp. 142-149
    • Brooke, S.L.1
  • 3
    • 0002091824 scopus 로고
    • The relationship between the judged desirability of a trait and the probability that the trait will be endorsed
    • Edwards, A.L. (1953), "The relationship between the judged desirability of a trait and the probability that the trait will be endorsed", Journal of Applied Psychology, Vol. 37 No. 2, pp. 90-93.
    • (1953) Journal of Applied Psychology , vol.37 , Issue.2 , pp. 90-93
    • Edwards, A.L.1
  • 5
    • 33749051841 scopus 로고    scopus 로고
    • Experiences from conducting semi-structured interviews in empirical software engineering research
    • IEEE, Como
    • Howe, S.E. and Anda, B. (2005), "Experiences from conducting semi-structured interviews in empirical software engineering research", Software Metrics, 2005, 11th IEEE International Symposium, IEEE, Como, p. 10.
    • (2005) Software Metrics, 2005, 11th IEEE International Symposium , pp. 10
    • Howe, S.E.1    Anda, B.2
  • 7
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • Kruger, H. and Kearney, W. (2006), "A prototype for assessing information security awareness", Computers & Security, Vol. 25 No. 4, pp. 289-296.
    • (2006) Computers & Security , vol.25 , Issue.4 , pp. 289-296
    • Kruger, H.1    Kearney, W.2
  • 8
    • 63049132678 scopus 로고    scopus 로고
    • How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
    • Liginlal, D., Sim, I. and Khansa, L. (2009), "How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management", Computers & Security, Vol. 28 No. 3, pp. 215-228.
    • (2009) Computers & Security , vol.28 , Issue.3 , pp. 215-228
    • Liginlal, D.1    Sim, I.2    Khansa, L.3
  • 11
    • 34948822955 scopus 로고    scopus 로고
    • How well are information risks being communicated to your computer end-users?
    • Pattinson, M.R. and Anderson, G. (2007), "How well are information risks being communicated to your computer end-users?", Information Management & Computer Security, Vol. 15 No. 5, pp. 362-371.
    • (2007) Information Management & Computer Security , vol.15 , Issue.5 , pp. 362-371
    • Pattinson, M.R.1    Anderson, G.2
  • 12
    • 84985273082 scopus 로고
    • Method bias: The importance of theory and measurement
    • Schmitt, N. (1994), "Method bias: the importance of theory and measurement", Journal of Organizational Behavior, Vol. 15 No. 5, pp. 393-398.
    • (1994) Journal of Organizational Behavior , vol.15 , Issue.5 , pp. 393-398
    • Schmitt, N.1
  • 14
    • 24644438691 scopus 로고    scopus 로고
    • The human factor in security
    • Schultz, E. (2005), "The human factor in security", Computers & Security, Vol. 24 No. 6, pp. 425-426.
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 425-426
    • Schultz, E.1
  • 15
    • 84985286296 scopus 로고
    • Using self-report questionnaires in OB research: A comment on the use of a controversial method
    • Spector, P.E. (1994), "Using self-report questionnaires in OB research: a comment on the use of a controversial method", Journal of Organizational Behavior, Vol. 15, pp. 385-392.
    • (1994) Journal of Organizational Behavior , vol.15 , pp. 385-392
    • Spector, P.E.1
  • 19
    • 0027542748 scopus 로고
    • Human error: An overlooked but significant information security problem
    • Wood, C.C. and Banks, W.W. (1993), "Human error: an overlooked but significant information security problem", Computers & Security, Vol. 12 No. 1, pp. 51-60.
    • (1993) Computers & Security , vol.12 , Issue.1 , pp. 51-60
    • Wood, C.C.1    Banks, W.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.