메뉴 건너뛰기




Volumn , Issue , 2004, Pages 1388-1394

Behavioral Information Security: Two End User Survey Studies of Motivation and Security Practices

Author keywords

Information security; motivation; organizational behavior

Indexed keywords

BEHAVIORAL RESEARCH; JOB SATISFACTION; MALWARE; PERSONAL COMPUTING; SURVEYS;

EID: 84914140899     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (18)
  • 1
    • 85139077377 scopus 로고    scopus 로고
    • Allen, N.J., and Meyer, J.P. (1990). The measurement and antecedents of affective, continuance and normative commitment to organizations. Journal of Occupational and Organizational Psychology, 63, 1-18.
    • Allen, N.J., and Meyer, J.P. (1990). The measurement and antecedents of affective, continuance and normative commitment to organizations. Journal of Occupational and Organizational Psychology, 63, 1-18.
  • 2
    • 85138992731 scopus 로고    scopus 로고
    • Anderson, R. H., Feldman, P. M., Gerwehr, S., Houghton, B., Mesic, R., Pinder, J. D., Rothenberg, J., and Chiesa, J. (1999). Securing the U.S. defense information infrastructure: A proposed approach. Washington, DC: Rand.
    • Anderson, R. H., Feldman, P. M., Gerwehr, S., Houghton, B., Mesic, R., Pinder, J. D., Rothenberg, J., and Chiesa, J. (1999). Securing the U.S. defense information infrastructure: A proposed approach. Washington, DC: Rand.
  • 3
    • 85139077786 scopus 로고    scopus 로고
    • Armstrong, L., Phillips, J. G., and Saling, L. L. (2000). Potential determinants of heavier Internet usage. International Journal of Human-Computer Studies, 53 (4), 537-550.
    • Armstrong, L., Phillips, J. G., and Saling, L. L. (2000). Potential determinants of heavier Internet usage. International Journal of Human-Computer Studies, 53 (4), 537-550.
  • 4
    • 85139058426 scopus 로고    scopus 로고
    • Dhillon, G. (Ed.) (2001). Information security management: Global challenges in the new millennium. Hershey, PA: Idea Group Publishing.
    • Dhillon, G. (Ed.) (2001). Information security management: Global challenges in the new millennium. Hershey, PA: Idea Group Publishing.
  • 5
    • 85139063586 scopus 로고    scopus 로고
    • Ernst and Young LLP. (2002) Global Information Security Survey. London: Presentation Services.
    • Ernst and Young LLP. (2002) Global Information Security Survey. London: Presentation Services.
  • 6
    • 85139078146 scopus 로고    scopus 로고
    • Loch, K. D., and Conger, S. (1996). Evaluating ethical decision-making and computer use. Communications of the ACM, 39 (7), 74-83.
    • Loch, K. D., and Conger, S. (1996). Evaluating ethical decision-making and computer use. Communications of the ACM, 39 (7), 74-83.
  • 7
    • 85139041691 scopus 로고    scopus 로고
    • Morahan-Martin, J., and Schumacher, P. (2000). Incidence and correlates of pathological Internet use among college students. Computers in Human Behavior, 16 (1), 13-29.
    • Morahan-Martin, J., and Schumacher, P. (2000). Incidence and correlates of pathological Internet use among college students. Computers in Human Behavior, 16 (1), 13-29.
  • 8
    • 85139006025 scopus 로고    scopus 로고
    • Mangione, T. W., Quinn, R. P. (1975). Job satisfaction, counterproductive behavior, and drug use at work. Journal of Applied Psychology, 60:114-116.
    • Mangione, T. W., Quinn, R. P. (1975). Job satisfaction, counterproductive behavior, and drug use at work. Journal of Applied Psychology, 60:114-116.
  • 9
    • 85139069743 scopus 로고    scopus 로고
    • Miles, D. E., Borman, W. E., Spector, P. E., and Fox, S. (2002). Building an integrative model of extra role work behaviors: A Comparison of counterproductive work behavior with organizational citizenship behavior. International Journal of Selection and Assessment, 10: 51-57.
    • Miles, D. E., Borman, W. E., Spector, P. E., and Fox, S. (2002). Building an integrative model of extra role work behaviors: A Comparison of counterproductive work behavior with organizational citizenship behavior. International Journal of Selection and Assessment, 10: 51-57.
  • 10
    • 85139003558 scopus 로고    scopus 로고
    • Organisation for Economic Co-Operation and Development (2002). Guidelines for the Security of Information Systems. Available at: http://www.ftc.gov/bcp/conline/edcams/infosecurity/popups/OECD_guidelines.pdf.
    • Organisation for Economic Co-Operation and Development (2002). Guidelines for the Security of Information Systems. Available at: http://www.ftc.gov/bcp/conline/edcams/infosecurity/popups/OECD_guidelines.pdf.
  • 11
    • 85139066327 scopus 로고    scopus 로고
    • Schneier, B. (2000). Secrets and Lies. New York: Wiley.
    • Schneier, B. (2000). Secrets and Lies. New York: Wiley.
  • 12
    • 85139011508 scopus 로고    scopus 로고
    • Shaw, E. D., Post, J. M., and Ruby, K. G. (2002). Inside the Mind of the Insider. Available at: http://www.securitymanagement.com/library/000762.html.
    • Shaw, E. D., Post, J. M., and Ruby, K. G. (2002). Inside the Mind of the Insider. Available at: http://www.securitymanagement.com/library/000762.html.
  • 13
    • 85139021155 scopus 로고    scopus 로고
    • Spector, P. E., and Fox, S. (2002). An emotion-centered model of voluntary work behavior: Some parallels between counterproductive work behavior and organizational citizenship behavior. Human Resource Management Review, 12:269-292.
    • Spector, P. E., and Fox, S. (2002). An emotion-centered model of voluntary work behavior: Some parallels between counterproductive work behavior and organizational citizenship behavior. Human Resource Management Review, 12:269-292.
  • 14
    • 85139084150 scopus 로고    scopus 로고
    • Stanton, J. M. (2002a). Company profile of the frequent Internet user: Web addict or happy employee? Communications of the Association for Computing Machinery, 45 (1), 55-59.
    • Stanton, J. M. (2002a). Company profile of the frequent Internet user: Web addict or happy employee? Communications of the Association for Computing Machinery, 45 (1), 55-59.
  • 15
    • 85139084133 scopus 로고    scopus 로고
    • Stanton, J. M., Stam, K. R., Guzman, I., and Caldera, C. (2003, October). Examining the linkage between organizational commitment and information security. Proceedings of the IEEE Systems, Man, and Cybernetics Conference, Washington, DC.
    • Stanton, J. M., Stam, K. R., Guzman, I., and Caldera, C. (2003, October). Examining the linkage between organizational commitment and information security. Proceedings of the IEEE Systems, Man, and Cybernetics Conference, Washington, DC.
  • 16
    • 85139022763 scopus 로고    scopus 로고
    • Straub, D.W. (1990). Effective IS security: an empirical study. Information System Research, 1 (2), 255-77.
    • Straub, D.W. (1990). Effective IS security: an empirical study. Information System Research, 1 (2), 255-77.
  • 17
    • 85139059817 scopus 로고    scopus 로고
    • Trice, H. M. (1993). Occupational subcultures in the workplace. Ithaca, N.Y.: ILR Press.
    • Trice, H. M. (1993). Occupational subcultures in the workplace. Ithaca, N.Y.: ILR Press.
  • 18
    • 85139059392 scopus 로고    scopus 로고
    • Won, D. (Ed.) (2001). Proceedings of the Third International Conference on Information security and cryptology (ICISC 2000), Seoul, Korea, December 8-9, 2000. Berlin: Springer.
    • Won, D. (Ed.) (2001). Proceedings of the Third International Conference on Information security and cryptology (ICISC 2000), Seoul, Korea, December 8-9, 2000. Berlin: Springer.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.