메뉴 건너뛰기




Volumn 148, Issue , 2004, Pages 3-18

Corporate information security education: Is outcomes based education the solution?

Author keywords

Awareness; Information security; Information security culture; Outcomes based education

Indexed keywords

COMPUTER PRIVACY; EDUCATION; SECURITY OF DATA;

EID: 84902481869     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 1
    • 0034140983 scopus 로고    scopus 로고
    • A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls
    • Barnard, L., Von Solms, R. (2000). A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls. Computers and Security, 19(2): pp. 185-194.
    • (2000) Computers and Security , vol.19 , Issue.2 , pp. 185-194
    • Barnard, L.1    von Solms, R.2
  • 3
  • 4
    • 13444312998 scopus 로고    scopus 로고
    • Department of Education (DOE), Department of Education., Available at
    • Department of Education (DOE). (2001) Draft Revised National Curriculum Statement: Technology Learning Area. Department of Education. Available at: http://education.pwv.gov.za/DoE_Sites/Curriculum/New_2005/draft_revised_national_curriculu.htm
    • (2001) Draft Revised National Curriculum Statement: Technology Learning Area
  • 5
    • 0003418012 scopus 로고    scopus 로고
    • New York, New York: SIGS Books & Multimedia Guidelines to the Management of Information Technology Security (GMITS). (1995). Part 1, ISO/IEC, JTC 1, SC27, WG 1
    • Fingar, P. (1996). The blueprint for business objects. New York, New York: SIGS Books & Multimedia Guidelines to the Management of Information Technology Security (GMITS). (1995). Part 1, ISO/IEC, JTC 1, SC27, WG 1.
    • (1996) The Blueprint For Business Objects
    • Fingar, P.1
  • 6
    • 84900591280 scopus 로고    scopus 로고
    • The Web and distance learning:What is appropriate and what is not
    • ITiCSE Working Group on the Web and Distance Learning
    • ITiCSE Working Group on the Web and Distance Learning (1997). The Web and distance learning:what is appropriate and what is not. ITiCSE'97 Working Group Reports and Supplemental Proceedings, pp. 27-37.
    • (1997) ITiCSE'97 Working Group Reports and Supplemental Proceedings , pp. 27-37
  • 7
    • 33847770271 scopus 로고    scopus 로고
    • Unpublished manuscript, University of Newcastle, Faculty of Education. [WWW document]. URL, Sited 20 August 2003
    • Killen, R. (2000). Outcomes-Based education: Principles and Possibilities. Unpublished manuscript, University of Newcastle, Faculty of Education. [WWW document]. URL http://www.schools.nt.edu.au/curricbr/cf/outcomefocus/killen_paper.pdf. Sited 20 August 2003.
    • (2000) Outcomes-Based Education: Principles and Possibilities
    • Killen, R.1
  • 10
    • 84908665492 scopus 로고    scopus 로고
    • Assessing Information Security Culture
    • Martins, A., Eloff, J.H.P. (2002) Assessing Information Security Culture. ISSA 2002, Muldersdrift, South Africa, 10-12 July 2002.
    • Martins, A.1    Eloff, J.H.P.2
  • 12
    • 6744258985 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), NIST Special Publication 800-16. U.S. Government Printing Office, Washington
    • National Institute of Standards and Technology (NIST). (1998). Information Technology Security Training Requirements: A Role- and Performance-Based Model. NIST Special Publication 800-16. U.S. Government Printing Office, Washington.
    • (1998) Information Technology Security Training Requirements: A Role- and Performance-Based Model
  • 13
    • 0033745439 scopus 로고    scopus 로고
    • Implementing Information Security In the 21st Century - Do You Have the Balancing Factors?
    • Elsevier Science Ltd
    • Nosworthy, J. D. (2000) Implementing Information Security In the 21st Century - Do You Have the Balancing Factors? Computer & Security (19), pp. 337-347. Elsevier Science Ltd.
    • (2000) Computer & Security , Issue.19 , pp. 337-347
    • Nosworthy, J.D.1
  • 17
    • 0013049553 scopus 로고    scopus 로고
    • South African Qualifications Authority (SAQA), Retrieved on 10 September 2003 from URL
    • South African Qualifications Authority (SAQA) (2000). The National Qualifications Framework and Curriculum Development. Retrieved on 10 September 2003 from URL http://www.saqa.org.za
    • (2000) The National Qualifications Framework and Curriculum Development
  • 20
    • 53049103906 scopus 로고    scopus 로고
    • Five Dimensions of Information Security Awareness
    • June 2001
    • Siponen, M.T. (2001). Five Dimensions of Information Security Awareness. Computers and Society, June 2001. Pp. 24-29.
    • (2001) Computers and Society , pp. 24-29
    • Siponen, M.T.1
  • 23
    • 22544461830 scopus 로고    scopus 로고
    • Education in Information Security
    • October-December 2000
    • Tripathi, A. (2000) Education in Information Security. IEEE Concurrency, October-December 2000, pp. 4-8.
    • (2000) IEEE Concurrency , pp. 4-8
    • Tripathi, A.1
  • 25
    • 84902481869 scopus 로고    scopus 로고
    • Establishing an Information Security Culture in Organisations: An Outcomes Based Education Approach
    • 9-11 July 2003, Sandton, South Africa
    • Van Niekerk, J., Von Solms, R. (2003). Establishing an Information Security Culture in Organisations: An Outcomes Based Education Approach. Proceedings of the 3rd Annual Information Security South Africa Conference, 9-11 July 2003, Sandton, South Africa, pp. 3-12.
    • (2003) Proceedings of the 3rd Annual Information Security South Africa Conference , pp. 3-12
    • van Niekerk, J.1    von Solms, R.2
  • 26
    • 0033657872 scopus 로고    scopus 로고
    • Information Security - The Third Wave?
    • Von Solms, B. (2000) Information Security - The Third Wave? Computers & Security, 19 (7), pp. 615-620.
    • (2000) Computers & Security , vol.19 , Issue.7 , pp. 615-620
    • von Solms, B.1
  • 27
    • 0001897127 scopus 로고    scopus 로고
    • Information Security Management: Why standards are important
    • Von Solms, R. (1999) Information Security Management: why standards are important. Information Management & Computer Security, 7 (1), pp. 50-57.
    • (1999) Information Management & Computer Security , vol.7 , Issue.1 , pp. 50-57
    • von Solms, R.1
  • 29
    • 33744787989 scopus 로고    scopus 로고
    • Policies alone do not constitute a sufficient awareness effort
    • December 1997
    • Wood, C.C. (1997) Policies alone do not constitute a sufficient awareness effort. Computer Fraud & Security, December 1997, pp. 14-19.
    • (1997) Computer Fraud & Security , pp. 14-19
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.