메뉴 건너뛰기




Volumn 22, Issue 4, 2014, Pages 393-406

Using phishing experiments and scenario-based surveys to understand security behaviours in practice

Author keywords

Experiment; Phishing; Security behaviour; Social engineering; Survey method

Indexed keywords

COMPUTER CRIME; DATA ACQUISITION; EXPERIMENTS; SECURITY OF DATA;

EID: 84898073317     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/IMCS-11-2013-0083     Document Type: Article
Times cited : (45)

References (22)
  • 5
    • 34250177210 scopus 로고    scopus 로고
    • The predictive validity of multiple-item versus single-item measures of the same constructs
    • Bergkvist, L. and Rossiter, J.R. (2007), "The predictive validity of multiple-item versus single-item measures of the same constructs", Journal of Marketing Research, Vol. 44 No. 2, pp. 175-184.
    • (2007) Journal of Marketing Research , vol.44 , Issue.2 , pp. 175-184
    • Bergkvist, L.1    Rossiter, J.R.2
  • 9
    • 33846794868 scopus 로고    scopus 로고
    • Phishing for user security awareness
    • Dodge, R., Carver, C. and Ferguson, A. (2007), "Phishing for user security awareness", Computers & Security, Vol. 26 No. 1, pp. 73-80.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 73-80
    • Dodge, R.1    Carver, C.2    Ferguson, A.3
  • 15
    • 84863815708 scopus 로고    scopus 로고
    • Social engineering: The neglected human factor for information security management
    • Luo, X., Brody, R., Seazzu, A. and Burd, S. (2011), "Social engineering: the neglected human factor for information security management", Information Resources Management Journal, Vol. 24 No. 3, pp. 1-8.
    • (2011) Information Resources Management Journal , vol.24 , Issue.3 , pp. 1-8
    • Luo, X.1    Brody, R.2    Seazzu, A.3    Burd, S.4
  • 16
    • 68749094117 scopus 로고    scopus 로고
    • Learning with computer-based learning environments: A literature review of computer self-efficacy
    • Moos, D.C. and Azevedo, R. (2009), "Learning with computer-based learning environments: a literature review of computer self-efficacy", Review of Educational Research, Vol. 79 No. 2, pp. 576-600.
    • (2009) Review of Educational Research , vol.79 , Issue.2 , pp. 576-600
    • Moos, D.C.1    Azevedo, R.2
  • 17
    • 84873466899 scopus 로고    scopus 로고
    • Social engineering audits using anonymous surveys - Conning the users in order to know if they can be conned
    • Las Vegas
    • Nohlberg, M. (2005), "Social engineering audits using anonymous surveys - conning the users in order to know if they can be conned", Proceedings of the 4th Security Conference, Las Vegas.
    • (2005) Proceedings of the 4th Security Conference
    • Nohlberg, M.1
  • 18
    • 0141907688 scopus 로고    scopus 로고
    • Common method biases in behavioral research: A critical review of the literature and recommended remedies
    • Podsakoff, P.M., Mackenzie, S.B., Lee, J.Y. and Podsakoff, N.P. (2003), "Common method biases in behavioral research: a critical review of the literature and recommended remedies", The Journal of applied psychology, Vol. 88 No. 5, pp. 879-903.
    • (2003) The Journal of Applied Psychology , vol.88 , Issue.5 , pp. 879-903
    • Podsakoff, P.M.1    MacKenzie, S.B.2    Lee, J.Y.3    Podsakoff, N.P.4
  • 20
    • 71949094501 scopus 로고    scopus 로고
    • Self-efficacy in information security: Its influence on end users' information security practice behavior
    • Rhee, H.-S., Kim, C. and Ryu, Y.U. (2009), "Self-efficacy in information security: its influence on end users' information security practice behavior", Computers & Security, Vol. 28 No. 8, pp. 816-826.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 816-826
    • Rhee, H.-S.1    Kim, C.2    Ryu, Y.U.3
  • 22
    • 39749142244 scopus 로고    scopus 로고
    • Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security
    • Workman, M. (2008), "Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security", Journal of the American Society for Information Science and Technology, Vol. 59 No. 4, pp. 662-674.
    • (2008) Journal of the American Society for Information Science and Technology , vol.59 , Issue.4 , pp. 662-674
    • Workman, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.