메뉴 건너뛰기




Volumn , Issue , 2014, Pages 704-711

The security awareness paradox: A case study

Author keywords

IT security; paradoxical reasoning; User awareness

Indexed keywords

SECURITY SYSTEMS; TELECOMMUNICATION INDUSTRY;

EID: 84911164336     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASONAM.2014.6921663     Document Type: Conference Paper
Times cited : (16)

References (29)
  • 1
    • 53049103906 scopus 로고    scopus 로고
    • Five dimensions of information security awareness
    • Jun
    • M. T. Siponen, "Five dimensions of information security awareness, " Computers and Society, vol. 31, no. 2, pp. 24-29, Jun. 2001.
    • (2001) Computers and Society , vol.31 , Issue.2 , pp. 24-29
    • Siponen, M.T.1
  • 2
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Sep
    • B. Bulgurcu, H. Cavusoglu, and I. Benbasat, "Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, " MIS Quarterly, vol. 34, no. 3, pp. 523-548, Sep. 2010.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 4
    • 19944394275 scopus 로고    scopus 로고
    • Bridging the gap between organizational and user perspectives of security in the clinical domain
    • Jul
    • A. Adams and A. Blandford, "Bridging the gap between organizational and user perspectives of security in the clinical domain, " International Journal of Human-Computer Studies, vol. 63, no. 1-2, pp. 175-202, Jul. 2005.
    • (2005) International Journal of Human-Computer Studies , vol.63 , Issue.1-2 , pp. 175-202
    • Adams, A.1    Blandford, A.2
  • 5
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Dec
    • A. Adams and M. A. Sasse, "Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures, " Communications of the ACM, vol. 42, no. 12, pp. 40-46, Dec. 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 6
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: A survey of end-users
    • Feb
    • S. M. Furnell, A. Jusoh, and D. Katsabas, "The challenges of understanding and using security: A survey of end-users, " Computers & Security, vol. 25, no. 1, pp. 27-35, Feb. 2006.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 27-35
    • Furnell, S.M.1    Jusoh, A.2    Katsabas, D.3
  • 7
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • May
    • T. Herath and H. R. Rao, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, " Decision Support Systems, vol. 47, no. 2, pp. 154-165, May 2009.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 8
    • 84870299131 scopus 로고    scopus 로고
    • Power to the people? the evolving recognition of human aspects of security
    • Nov
    • S. M. Furnell and N. Clarke, "Power to the people? The evolving recognition of human aspects of security, " Computers & Security, vol. 31, no. 8, pp. 983-988, Nov. 2012.
    • (2012) Computers & Security , vol.31 , Issue.8 , pp. 983-988
    • Furnell, S.M.1    Clarke, N.2
  • 9
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • Sep
    • M. Workman, W. H. Bommer, and D. Straub, "Security lapses and the omission of information security measures: A threat control model and empirical test, " Computers in Human Behavior, vol. 24, no. 6, pp. 2799-2816, Sep. 2008.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 10
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • Mar
    • B.-Y. Ng, A. Kankanhalli, and Y. C. Xu, "Studying users' computer security behavior: A health belief perspective, " Decision Support Systems, vol. 46, no. 4, pp. 815-825, Mar. 2009.
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.C.3
  • 12
    • 33846277633 scopus 로고    scopus 로고
    • User-centered security: Stepping up to the grand challenge
    • ser. ACSAC'05. Washington, DC: IEEE Computer Society
    • M. E. Zurko, "User-centered security: Stepping up to the grand challenge, " in Proceedings of the 21st Annual Computer Security Applications Conference, ser. ACSAC'05. Washington, DC: IEEE Computer Society, 2005, pp. 187-200.
    • (2005) Proceedings of the 21st Annual Computer Security Applications Conference , pp. 187-200
    • Zurko, M.E.1
  • 13
    • 67349280492 scopus 로고    scopus 로고
    • Does one size fit all? Examining the differential effects of is security countermeasures
    • May
    • J. D'Arcy and A. Hovav, "Does one size fit all? Examining the differential effects of IS security countermeasures, " Journal of Business Ethics, vol. 89, no. 1, pp. 59-71, May 2009.
    • (2009) Journal of Business Ethics , vol.89 , Issue.1 , pp. 59-71
    • D'Arcy, J.1    Hovav, A.2
  • 17
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Jun
    • E. Albrechtsen, "A qualitative study of users' view on information security, " Computers & Security, vol. 26, no. 4, pp. 276-289, Jun. 2007.
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 18
    • 84891789669 scopus 로고    scopus 로고
    • Employees' adherence to information security policies: An exploratory field study
    • Mar
    • M. Siponen, M. A. Mahmood, and S. Pahnila, "Employees' adherence to information security policies: an exploratory field study, " Information & Management, vol. 51, no. 2, pp. 217-224, Mar. 2014.
    • (2014) Information & Management , vol.51 , Issue.2 , pp. 217-224
    • Siponen, M.1    Mahmood, M.A.2    Pahnila, S.3
  • 19
    • 85084161247 scopus 로고    scopus 로고
    • Why johnny can't encrypt: A usability evaluation of pgp 5.0
    • ser. SSYM'99. Berkeley, CA: USENIX Association
    • A. Whitten and J. D. Tygar, "Why Johnny can't encrypt: A usability evaluation of PGP 5.0, " in Proceedings of the 8th USENIX Security Symposium, ser. SSYM'99. Berkeley, CA: USENIX Association, 1999.
    • (1999) Proceedings of the 8th USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2
  • 21
    • 0030535841 scopus 로고    scopus 로고
    • Self-favoring biases for positive and negative characteristics: Independent phenomena?
    • Mar
    • V. Hoorens, "Self-favoring biases for positive and negative characteristics: Independent phenomena?" Journal of Social and Clinical Psychology, vol. 15, no. 1, pp. 53-67, Mar. 1996.
    • (1996) Journal of Social and Clinical Psychology , vol.15 , Issue.1 , pp. 53-67
    • Hoorens, V.1
  • 22
    • 84857359642 scopus 로고    scopus 로고
    • Unrealistic optimism on information security management
    • Mar
    • H.-S. Rhee, Y. U. Ryu, and C.-T. Kim, "Unrealistic optimism on information security management, " Computers & Security, vol. 31, no. 2, pp. 221-232, Mar. 2012.
    • (2012) Computers & Security , vol.31 , Issue.2 , pp. 221-232
    • Rhee, H.-S.1    Ryu, Y.U.2    Kim, C.-T.3
  • 23
    • 42149161709 scopus 로고    scopus 로고
    • The psychology of security: Why do good users make bad decisions?
    • Apr
    • R. West, "The psychology of security: Why do good users make bad decisions?" Communications of the ACM, vol. 51, no. 4, pp. 34-40, Apr. 2008.
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 34-40
    • West, R.1
  • 25
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in is security research: Towards socio-organizational perspectives
    • Apr
    • G. Dhillon and J. Backhouse, "Current directions in IS security research: towards socio-organizational perspectives, " Information Systems Journal, vol. 11, no. 2, pp. 127-153, Apr. 2001.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 28
    • 44949276843 scopus 로고
    • Restating the foundation of information security
    • Oct
    • D. B. Parker, "Restating the foundation of information security, " Computer Audit Update, vol. 1991, no. 10, pp. 2-15, Oct. 1991.
    • (1991) Computer Audit Update , vol.1991 , Issue.10 , pp. 2-15
    • Parker, D.B.1
  • 29
    • 84900482702 scopus 로고    scopus 로고
    • Security in the wild: User strategies for managing security as an everyday, practical problem
    • Nov
    • P. Dourish, R. E. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the wild: user strategies for managing security as an everyday, practical problem, " Personal and Ubiquitous Computing, vol. 8, no. 6, pp. 391-401, Nov. 2004.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 391-401
    • Dourish, P.1    Grinter, R.E.2    Flor De La J.Delgado3    Joseph, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.