메뉴 건너뛰기




Volumn 122, Issue , 2003, Pages 313-324

Perceptions of security contributing to the implementation of secure IS

Author keywords

Information systems implementation; Is security integration; Metaphors; Security perceptions

Indexed keywords

INFORMATION SYSTEMS;

EID: 84904349582     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-35691-4     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 1
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • Anderson, R.J. (1993), "Why cryptosystems fail", Communications of the ACM, Vol. 37, No 11, pp. 32-44.
    • (1993) Communications of the ACM , vol.37 , Issue.11 , pp. 32-44
    • Anderson, R.J.1
  • 2
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibilities and security of information systems
    • Backhouse, J. and Dhillon, G. (1996), "Structures of responsibilities and security of information systems", European Journal of Information Systems, Vol. 5, No 1, pp. 2-10.
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-10
    • Backhouse, J.1    Dhillon, G.2
  • 3
    • 0027804413 scopus 로고
    • Information Systems Security Design Methods: Implications for Information Systems Development
    • Baskerville, R. (1993), "Information Systems Security Design Methods: Implications for Information Systems Development", ACM Computing Surveys, Vol. 25, No. 4, pp. 375-414.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 4
    • 0038856298 scopus 로고
    • Metaphorical traps in developing information systems for human progress
    • Klein, H.K. and Kumar, K. (Eds.)
    • Boland, R.J. (1989), "Metaphorical traps in developing information systems for human progress", in Klein, H.K. and Kumar, K. (Eds.), Systems Development for Human Progress, Elsevier Science Publishers, pp.277-290.
    • (1989) Systems Development For Human Progress, Elsevier Science Publishers , pp. 277-290
    • Boland, R.J.1
  • 5
    • 0035149731 scopus 로고    scopus 로고
    • Evaluating Trust in a Public Key Certification Authority
    • Chadwick, D.W. and Basden, A. (2001), "Evaluating Trust in a Public Key Certification Authority", Computers & Security, Vol. 20, No 7, pp. 592-611.
    • (2001) Computers & Security , vol.20 , Issue.7 , pp. 592-611
    • Chadwick, D.W.1    Basden, A.2
  • 6
    • 0035658603 scopus 로고    scopus 로고
    • Computer crimes: Theorizing about the enemy within
    • Dhillon, G. and Moores, S. (2001), "Computer crimes: theorizing about the enemy within", Computers & Security, Vol. 20, No 8, pp. 715-723.
    • (2001) Computers & Security , vol.20 , Issue.8 , pp. 715-723
    • Dhillon, G.1    Moores, S.2
  • 8
    • 0031631068 scopus 로고    scopus 로고
    • A conceptual framework for information security management
    • Finne, T. (1998), "A conceptual framework for information security management", Computers & Security, Vol 17, pp. 303-307.
    • (1998) Computers & Security , vol.17 , pp. 303-307
    • Finne, T.1
  • 9
    • 0000722720 scopus 로고    scopus 로고
    • An empirical investigation into the adoption of systems development methodologies
    • Fitzgerald, B. (1998), "An empirical investigation into the adoption of systems development methodologies", Information & Management, Vol. 34, pp. 317-328.
    • (1998) Information & Management , vol.34 , pp. 317-328
    • Fitzgerald, B.1
  • 10
    • 84886350199 scopus 로고    scopus 로고
    • Practical management of programme risk: The case of the National Strategy for Police Information Systems for England and Wales
    • Frosdick, S. and Odell, A. (1996), "Practical management of programme risk: the case of the National Strategy for Police Information Systems for England and Wales", Information Management & Computer Security, Vol. 4, No 5, pp. 24-33.
    • (1996) Information Management & Computer Security , vol.4 , Issue.5 , pp. 24-33
    • Frosdick, S.1    Odell, A.2
  • 11
    • 0011432676 scopus 로고
    • Deficiencies of the traditional approach to information security and the requirements for a new methodology
    • Hitchings, J. (1995a), "Deficiencies of the traditional approach to information security and the requirements for a new methodology", Computers & Security, Vol. 14, pp. 377-83.
    • (1995) Computers & Security , vol.14 , pp. 377-383
    • Hitchings, J.1
  • 12
    • 8644292339 scopus 로고
    • Achieving an Integrated Design: The Way Forward for Information Security
    • Eloff, J. and von Solms, S. (Eds.), Chapman & Hall
    • Hitchings, J. (1995b), "Achieving an Integrated Design: The Way Forward for Information Security", in Eloff, J. and von Solms, S. (Eds.), Information Security - the next decade, Chapman & Hall, pp. 369-383.
    • (1995) Information Security - the Next Decade , pp. 369-383
    • Hitchings, J.1
  • 13
    • 84986166532 scopus 로고    scopus 로고
    • Factors in the selection of a risk assessment method
    • Liechtenstein, S. (1996), "Factors in the selection of a risk assessment method", Information Management & Computer Security, Vol. 4, No 4, pp. 20-25.
    • (1996) Information Management & Computer Security , vol.4 , Issue.4 , pp. 20-25
    • Liechtenstein, S.1
  • 14
    • 84936823916 scopus 로고    scopus 로고
    • 2nd Ed., SAGE Publications, California
    • Morgan, G. (1997), Images of Organization, 2nd Ed., SAGE Publications, California.
    • (1997) Images of Organization
    • Morgan, G.1
  • 15
    • 84870320398 scopus 로고    scopus 로고
    • After the break-in occurs: How to handle the student hacker
    • Muir, S. (1997), "After the break-in occurs: How to handle the student hacker", Library High Tech, Vol. 15, No 1&2, pp. 92-95.
    • (1997) Library High Tech , vol.15 , Issue.1-2 , pp. 92-95
    • Muir, S.1
  • 16
    • 0011644488 scopus 로고    scopus 로고
    • An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications
    • Dhillon, G. (Ed.), Idea Group Publishing
    • Siponen, M. (2001), "An Analysis of the Recent IS Security Development Approaches: Descriptive and Prescriptive Implications", in Dhillon, G. (Ed.), Information Security Management: Global Challenges in the New Millennium, Idea Group Publishing, pp. 101-124.
    • (2001) Information Security Management: Global Challenges In the New Millennium , pp. 101-124
    • Siponen, M.1
  • 18
    • 70449354344 scopus 로고    scopus 로고
    • Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques
    • Eloff, J.H.P. et al. (Eds.), Kluwer Academic Publishers
    • Smith, E. and Eloff, J.H.P. (2001), "Transaction Based Risk Analysis - Using Cognitive Fuzzy Techniques", in Eloff, J.H.P. et al. (Eds.), Advances in Information Security Management & Small Systems Security, Kluwer Academic Publishers.
    • (2001) Advances In Information Security Management & Small Systems Security
    • Smith, E.1    Eloff, J.H.P.2
  • 19
    • 0003168891 scopus 로고    scopus 로고
    • Security requirements, risks, and recommendations for small enterprise and home-office environments
    • Spinellis, D., Kokolakis, S. and Gritzalis, S. (1999), "Security requirements, risks, and recommendations for small enterprise and home-office environments", Information Management & Computer Security, Vol. 7, No 3, pp. 121-128.
    • (1999) Information Management & Computer Security , vol.7 , Issue.3 , pp. 121-128
    • Spinellis, D.1    Kokolakis, S.2    Gritzalis, S.3
  • 20
    • 0242453511 scopus 로고
    • Promoting security awareness and commitment
    • Spurling, P. (1995), "Promoting security awareness and commitment", Information Management & Computer Security, Vol. 3, No 2, pp. 20-26.
    • (1995) Information Management & Computer Security , vol.3 , Issue.2 , pp. 20-26
    • Spurling, P.1
  • 22
    • 0003066147 scopus 로고
    • Organisational metaphors and information systems research
    • Walsham, G. (1991), "Organisational metaphors and information systems research", European Journal of Information Systems, Vol. 1, No. 2, pp. 83-94.
    • (1991) European Journal of Information Systems , vol.1 , Issue.2 , pp. 83-94
    • Walsham, G.1
  • 23
    • 84974872728 scopus 로고
    • Interpretive case studies in IS research: Nature and method
    • Walsham, G. (1995), "Interpretive case studies in IS research: nature and method", European Journal of Information Systems, Vol. 4, pp. 74-81.
    • (1995) European Journal of Information Systems , vol.4 , pp. 74-81
    • Walsham, G.1
  • 24
    • 0011430405 scopus 로고
    • ISO 9000 and Information Security
    • Wood, C.C. and Snow, K. (1995), "ISO 9000 and Information Security", Computers & Security, Vol. 14, pp. 287-288.
    • (1995) Computers & Security , vol.14 , pp. 287-288
    • Wood, C.C.1    Snow, K.2
  • 25
    • 84904304182 scopus 로고    scopus 로고
    • A holistic approach to IT security
    • Eloff, J. and von Solms, S. (Eds.), Chapman & Hall, London
    • Yngstróm, L. (1996), "A holistic approach to IT security", in Eloff, J. and von Solms, S. (Eds.), Information Security - The Next Decade, Chapman & Hall, London.
    • (1996) Information Security - the Next Decade
    • Yngstróm, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.