메뉴 건너뛰기




Volumn , Issue , 2012, Pages 296-315

Towards an organizational culture framework for information security practices

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898347739     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-0197-0.ch017     Document Type: Chapter
Times cited : (15)

References (58)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Adams, A., & Sasse, M. A. (1999). Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM, 42(12), 41-46.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 41-46
    • Adams, A.1    Sasse, M.A.2
  • 3
    • 32844472020 scopus 로고    scopus 로고
    • Achievement-based rewards and intrinsic motivation: A test of cognitive mediators
    • doi:10.1037/0022-0663.97.4.641
    • Cameron, J., Pierce, W. D., Banko, K. M., & Gear, A. (2005). Achievement-based rewards and intrinsic motivation: A test of cognitive mediators. Journal of Educational Psychology, 97(4), 641-655. doi:10.1037/0022-0663.97.4.641
    • (2005) Journal of Educational Psychology , vol.97 , Issue.4 , pp. 641-655
    • Cameron, J.1    Pierce, W.D.2    Banko, K.M.3    Gear, A.4
  • 5
    • 33947189095 scopus 로고    scopus 로고
    • Exploring organizational culture for information security management
    • doi:10.1108/02635570710734316
    • Chang, S. E., & Lin, C. S. (2007). Exploring organizational culture for information security management. Industrial Management & Data Systems, 107(3), 438-458. doi:10.1108/02635570710734316
    • (2007) Industrial Management & Data Systems , vol.107 , Issue.3 , pp. 438-458
    • Chang, S.E.1    Lin, C.S.2
  • 8
    • 0010612318 scopus 로고
    • Management theory and total quality: Improving research and practice through theory development
    • Dean, J. W., & Bowen, D. E. (1994). Management theory and total quality: Improving research and practice through theory development. Academy of Management Review, 19, 392-418.
    • (1994) Academy of Management Review , vol.19 , pp. 392-418
    • Dean, J.W.1    Bowen, D.E.2
  • 9
    • 0003964033 scopus 로고
    • Cambridge, MA, MIT Center for Advanced Engineering Study
    • Deming, W. E. (1986). Out of the Crisis. Cambridge, MA: MIT Center for Advanced Engineering Study.
    • (1986) Out of the Crisis
    • Deming, W.E.1
  • 11
    • 84879906958 scopus 로고
    • Toward a theory of organizational culture and effectiveness
    • doi:10.1287/orsc.6.2.204
    • Denison, D. R., & Mishra, A. (1995). Toward a theory of organizational culture and effectiveness. Organization Science, 6, 204-224. doi:10.1287/orsc.6.2.204
    • (1995) Organization Science , vol.6 , pp. 204-224
    • Denison, D.R.1    Mishra, A.2
  • 12
    • 0034335593 scopus 로고    scopus 로고
    • A framework for linking culture and improvement initiatives in organisations
    • Detert, J. R., Schroeder, R. G., & Mauriel, J. J. (2000). A framework for linking culture and improvement initiatives in organisations. Academy of Management Review, 25(4), 850-863.
    • (2000) Academy of Management Review , vol.25 , Issue.4 , pp. 850-863
    • Detert, J.R.1    Schroeder, R.G.2    Mauriel, J.J.3
  • 14
    • 0001336426 scopus 로고
    • Agency theory: An assessment and review
    • Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of Management Review, 14(1), 57-74.
    • (1989) Academy of Management Review , vol.14 , Issue.1 , pp. 57-74
    • Eisenhardt, K.M.1
  • 15
    • 85031300675 scopus 로고    scopus 로고
    • Building management commitment through security councils, or security council critical success factors
    • In Tipton, H. F. (Ed.), Hoboken, NJ, Auerbach Publications, doi:10.1201/9781439833032.ch10
    • Fitzgerald, T. (2007). Building management commitment through security councils, or security council critical success factors. In Tipton, H. F. (Ed.), Information security management handbook (pp. 105-121). Hoboken, NJ: Auerbach Publications. doi:10.1201/9781439833032.ch10
    • (2007) Information Security Management Handbook , pp. 105-121
    • Fitzgerald, T.1
  • 16
    • 61349200300 scopus 로고    scopus 로고
    • From culture to disobedience: Recognising the varying user acceptance of IT security
    • doi:10.1016/S1361-3723(09)70019-3
    • Furnell, S., & Thompson, K. L. (2009). From culture to disobedience: Recognising the varying user acceptance of IT security. Computer Fraud & Security, 2, 5-10. doi:10.1016/S1361-3723(09)70019-3
    • (2009) Computer Fraud & Security , vol.2 , pp. 5-10
    • Furnell, S.1    Thompson, K.L.2
  • 17
    • 1142275569 scopus 로고    scopus 로고
    • Information security culture in a value net
    • Managing Technologically Driven Organizations: The Human Side of Innovation and Change
    • Helokunnas, T., & Kuusisto, R. (2003). Information security culture in a value net. In Engineering Management Conference, 2003. IEMC'03. Managing Technologically Driven Organizations: The Human Side of Innovation and Change.
    • (2003) Engineering Management Conference, 2003. IEMC'03
    • Helokunnas, T.1    Kuusisto, R.2
  • 19
    • 84936823890 scopus 로고
    • Measuring organizational cultures: A qualitative and quantitative study across twenty cases
    • doi:10.2307/2393392
    • Hofstede, G., Neuijen, B., Ohayv, D. D., & Sanders, G. (1990). Measuring organizational cultures: A qualitative and quantitative study across twenty cases. Administrative Science Quarterly, 35(2), 286-316. doi:10.2307/2393392
    • (1990) Administrative Science Quarterly , vol.35 , Issue.2 , pp. 286-316
    • Hofstede, G.1    Neuijen, B.2    Ohayv, D.D.3    Sanders, G.4
  • 20
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretative field studies in Information Systems
    • doi:10.2307/249410
    • Klein, H. K., & Myers, M. D. (1999). A set of principles for conducting and evaluating interpretative field studies in Information Systems. Management Information Systems Quarterly, 23(1), 67-94. doi:10.2307/249410
    • (1999) Management Information Systems Quarterly , vol.23 , Issue.1 , pp. 67-94
    • Klein, H.K.1    Myers, M.D.2
  • 21
    • 33644533141 scopus 로고    scopus 로고
    • Information security: Management's effect on culture and policy
    • doi:10.1108/09685220610648355
    • Knapp, K. J., Marshall, T. E., Rainer, R. K., & Ford, F. N. (2006). Information security: Management's effect on culture and policy. Information and Computer Security, 14(1), 24-36. doi:10.1108/09685220610648355
    • (2006) Information and Computer Security , vol.14 , Issue.1 , pp. 24-36
    • Knapp, K.J.1    Marshall, T.E.2    Rainer, R.K.3    Ford, F.N.4
  • 24
    • 40549099995 scopus 로고    scopus 로고
    • Promoting personal responsibility for Internet safety
    • doi:10.1145/1325555.1325569
    • LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for Internet safety. Communications of the ACM, 51(3), 71-76. doi:10.1145/1325555.1325569
    • (2008) Communications of the ACM , vol.51 , Issue.3 , pp. 71-76
    • Larose, R.1    Rifon, N.J.2    Enbody, R.3
  • 28
    • 84864562281 scopus 로고    scopus 로고
    • What makes a good information security policy: A preliminary framework for evaluating security policy quality
    • Las Vegas, Nevada USA
    • Maynard, S. B., & Ruighaver, A. B. (2006). What makes a good information security policy: A preliminary framework for evaluating security policy quality. In Proceedings of the Fifth Annual Security Conference, Las Vegas, Nevada USA.
    • (2006) Proceedings of the Fifth Annual Security Conference
    • Maynard, S.B.1    Ruighaver, A.B.2
  • 29
    • 0000250672 scopus 로고
    • People and organizational culture: A profile comparison approach to assessing personorganization fit
    • doi:10.2307/256404
    • O'Reilly, C. A., Chatman, J. R., & Caldwell, D. F. (1991). People and organizational culture: A profile comparison approach to assessing personorganization fit. Academy of Management Journal, 34(3), 487-516. doi:10.2307/256404
    • (1991) Academy of Management Journal , vol.34 , Issue.3 , pp. 487-516
    • O'Reilly, C.A.1    Chatman, J.R.2    Caldwell, D.F.3
  • 32
    • 77957881878 scopus 로고    scopus 로고
    • Collaborative risk method for information security management practices: A case context within Turkey
    • doi:10.1016/j.ijinfomgt.2010.08.007
    • Ozkana, S., & Karabacaka, B. (2010). Collaborative risk method for information security management practices: A case context within Turkey. International Journal of Information Management, 30, 567-572. doi:10.1016/j.ijinfomgt.2010.08.007
    • (2010) International Journal of Information Management , vol.30 , pp. 567-572
    • Ozkana, S.1    Karabacaka, B.2
  • 33
    • 84980302007 scopus 로고
    • Organizational culture as related to industry, position, and performance: A preminary report
    • doi:10.1111/j.1467-6486.1986. tb00958.x
    • Reynolds, P. D. (1986). Organizational culture as related to industry, position, and performance: A preminary report. Journal of Management Studies, 23(3), 333-345. doi:10.1111/j.1467-6486.1986. tb00958.x
    • (1986) Journal of Management Studies , vol.23 , Issue.3 , pp. 333-345
    • Reynolds, P.D.1
  • 36
    • 33846849570 scopus 로고    scopus 로고
    • Organisational security culture: Extending the end-user perspective
    • doi:10.1016/j.cose.2006.10.008
    • Ruighaver, A. B., Maynard, S. B., & Chang, S. (2007). Organisational security culture: Extending the end-user perspective. Computers & Security, 26(1), 56-62. doi:10.1016/j.cose.2006.10.008
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 56-62
    • Ruighaver, A.B.1    Maynard, S.B.2    Chang, S.3
  • 38
    • 0002541451 scopus 로고
    • Good seeds grow in strong cultures
    • Saphier, J., & King, M. (1985). Good seeds grow in strong cultures. Educational Leadership, 43(6), 67-74.
    • (1985) Educational Leadership , vol.43 , Issue.6 , pp. 67-74
    • Saphier, J.1    King, M.2
  • 40
    • 78650874414 scopus 로고    scopus 로고
    • Information security culture - The social-cultural dimension in information security management
    • Cairo, Egypt
    • Schlienger, T., & Teufel, S. (2002). Information security culture - The social-cultural dimension in information security management. In IFIP TC11 International Conference on Information Security, Cairo, Egypt.
    • (2002) IFIP TC11 International Conference On Information Security
    • Schlienger, T.1    Teufel, S.2
  • 43
    • 67651102640 scopus 로고    scopus 로고
    • Information security management standards: Problems and solutions
    • doi:10.1016/j.im.2008.12.007
    • Siponen, M., & Willison, R. (2009). Information security management standards: Problems and solutions. Information & Management, 46, 267-270. doi:10.1016/j.im.2008.12.007
    • (2009) Information & Management , vol.46 , pp. 267-270
    • Siponen, M.1    Willison, R.2
  • 44
    • 84864572119 scopus 로고    scopus 로고
    • Beyond information security awareness training: It is time to change the culture
    • In Tipton, H. F. (Ed.), Hoboken, NJ, Auerbach Publications
    • Stan, S. (2007). Beyond information security awareness training: It is time to change the culture. In Tipton, H. F. (Ed.), Information security management handbook (pp. 555-565). Hoboken, NJ: Auerbach Publications.
    • (2007) Information Security Management Handbook , pp. 555-565
    • Stan, S.1
  • 46
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • doi:10.2307/249551
    • Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making. Management Information Systems Quarterly, 22(4), 441-469. doi:10.2307/249551
    • (1998) Management Information Systems Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 48
    • 33750923703 scopus 로고    scopus 로고
    • Cultivating an organizational information security culture
    • doi:10.1016/S1361-3723(06)70430-4
    • Thomson, K., von Solms, R., & Louw, L. (2006). Cultivating an organizational information security culture. Computer Fraud & Security, (10): 7-11. doi:10.1016/S1361-3723(06)70430-4
    • (2006) Computer Fraud & Security , Issue.10 , pp. 7-11
    • Thomson, K.1    von Solms, R.2    Louw, L.3
  • 50
    • 74449092722 scopus 로고    scopus 로고
    • A framework and assessment instrument for information security culture
    • doi:10.1016/j.cose.2009.09.002
    • Veiga, A. D., & Eloff, J. H. P. (2009). A framework and assessment instrument for information security culture. Computers & Security, 29, 196-207. doi:10.1016/j.cose.2009.09.002
    • (2009) Computers & Security , vol.29 , pp. 196-207
    • Veiga, A.D.1    Eloff, J.H.P.2
  • 51
    • 0033657872 scopus 로고    scopus 로고
    • Information security --The third wave?
    • doi:10.1016/S0167-4048(00)07021-8
    • Von Solms, B. (2000). Information security --The third wave? Computers & Security, 19(7), 615-620. doi:10.1016/S0167-4048(00)07021-8
    • (2000) Computers & Security , vol.19 , Issue.7 , pp. 615-620
    • von Solms, B.1
  • 52
    • 0034814690 scopus 로고    scopus 로고
    • Information Security -- A multidimensional discipline
    • doi:10.1016/S0167-4048(01)00608-3
    • Von Solms, B. (2001). Information Security -- A multidimensional discipline. Computers & Security, 20(6), 504-508. doi:10.1016/S0167-4048(01)00608-3
    • (2001) Computers & Security , vol.20 , Issue.6 , pp. 504-508
    • von Solms, B.1
  • 53
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • doi:10.1016/j.cose.2004.01.012
    • Vroom, C., & von Solms, R. (2004). Towards information security behavioural compliance. Computers & Security, 23(3), 191-198. doi:10.1016/j. cose.2004.01.012
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    von Solms, R.2
  • 54
    • 84974872728 scopus 로고
    • Interpretive case studies in IS research: Nature and method
    • doi:10.1057/ejis.1995.9
    • Walsham, G. (1995). Interpretive case studies in IS research: Nature and method. European Journal of Information Systems, 4, 74-81. doi:10.1057/ejis.1995.9
    • (1995) European Journal of Information Systems , vol.4 , pp. 74-81
    • Walsham, G.1
  • 56
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Workman, M., Bommer, W., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior.
    • (2008) Computers In Human Behavior
    • Workman, M.1    Bommer, W.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.