메뉴 건너뛰기




Volumn 1065, Issue , 2013, Pages 92-101

Cyber security in the workplace: Understanding and promoting behaviour change

Author keywords

Behaviour change; Cyber security; Information security

Indexed keywords

BEHAVIORAL RESEARCH; MOBILE SECURITY;

EID: 84924405869     PISSN: 16130073     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (20)
  • 4
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly. 34, 523-548 (2010)
    • (2010) MIS Quarterly , vol.34 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 5
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory
    • Ifinedo, P.: Understanding information systems security policy compliance: An integration of the theory of planned behaviour and the protection motivation theory. Computers & Security. 31, 83-95 (2012)
    • (2012) Computers & Security , vol.31 , pp. 83-95
    • Ifinedo, P.1
  • 6
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., Rao, H. R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems. 18, 2, 106-125 (2009)
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 7
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviours in organisations: Role of penalties, pressures and perceived effectiveness
    • Herath, T., Rao, H. R.: Encouraging information security behaviours in organisations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems. 47, 2, 154-165 (2009)
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 8
    • 33746766203 scopus 로고    scopus 로고
    • The role of theory in developing effective health communications
    • Fishbein, M., Cappella, J. N.: The role of theory in developing effective health communications. Journal of Communication. 56, S1-S17 (2006)
    • (2006) Journal of Communication , vol.56 , pp. S1-S17
    • Fishbein, M.1    Cappella, J.N.2
  • 9
    • 77957077814 scopus 로고    scopus 로고
    • Practicing safe computing: A multimedia empirical examination of home computer user security behavioural intentions
    • Anderson, C. L., Agarwal, R.: Practicing safe computing: a multimedia empirical examination of home computer user security behavioural intentions. MIS Quarterly. 34, 3, 613-643 (2010)
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 613-643
    • Anderson, C.L.1    Agarwal, R.2
  • 10
    • 78650770842 scopus 로고    scopus 로고
    • Improving employees' compliance through information systems security training: An action research study
    • Puhakainen, P., Siponen, M.: Improving employees' compliance through information systems security training: An action research study. MIS Quarterly. 34, 757-778 (2010)
    • (2010) MIS Quarterly , vol.34 , pp. 757-778
    • Puhakainen, P.1    Siponen, M.2
  • 11
    • 77956187913 scopus 로고    scopus 로고
    • It won't happen to me: Promoting secure behaviour among internet users
    • Davinson, N., Sillence, E.: It won't happen to me: Promoting secure behaviour among internet users. Computers in Human Behaviour. 26, 1739-1747 (2010)
    • (2010) Computers in Human Behaviour , vol.26 , pp. 1739-1747
    • Davinson, N.1    Sillence, E.2
  • 12
    • 40949147823 scopus 로고    scopus 로고
    • The qualitative content analysis process
    • Elo, S., Kyngäs, H.: The qualitative content analysis process. Journal of advanced nursing. 62, 1, 107-115 (2008)
    • (2008) Journal of Advanced Nursing , vol.62 , Issue.1 , pp. 107-115
    • Elo, S.1    Kyngäs, H.2
  • 13
    • 85011237933 scopus 로고    scopus 로고
    • 'I wanna tell you a story': Exploring the application of vignettes in qualitative research with children and young people
    • Barter, C, Renold, E.: 'I wanna tell you a story': exploring the application of vignettes in qualitative research with children and young people. International Journal of Social Research Methodology. 3, 4, 307-323 (2000)
    • (2000) International Journal of Social Research Methodology , vol.3 , Issue.4 , pp. 307-323
    • Barter, C.1    Renold, E.2
  • 14
    • 0001457476 scopus 로고
    • Qualitative data analysis for applied policy research
    • Bryman, A. & Burgess, R. G. eds., Sage, London
    • Ritchie, J., Spencer, L.: Qualitative data analysis for applied policy research. In: Bryman, A. & Burgess, R. G. [eds.] "Analyzing qualitative data". Sage, London. (1994)
    • (1994) Analyzing Qualitative Data
    • Ritchie, J.1    Spencer, L.2
  • 15
    • 47749113622 scopus 로고    scopus 로고
    • A taxonomy of behavior change techniques used in interventions
    • Abraham, C, Michie, S.: A taxonomy of behavior change techniques used in interventions. Health psychology. 27, 3, 379 (2008)
    • (2008) Health Psychology , vol.27 , Issue.3 , pp. 379
    • Abraham, C.1    Michie, S.2
  • 19
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behaviour: A health belief perspective
    • Ng, B.-Y., Kankanhalli, A., Xu, Y.: Studying users' computer security behaviour: A health belief perspective. Decision Support Systems. 46, 4, 815-825 (2009)
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.