메뉴 건너뛰기




Volumn 49, Issue , 2015, Pages 162-176

Improving the information security culture through monitoring and implementation actions illustrated through a case study

Author keywords

Assessment; Awareness; Benchmark; Comparative analysis; Human element; Information security culture; Monitoring; Survey; Training

Indexed keywords

BENCHMARKING; MOBILE SECURITY; MONITORING; MULTIVARIANT ANALYSIS; PERSONNEL TRAINING; REGULATORY COMPLIANCE; SURVEYING;

EID: 84925656546     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.12.006     Document Type: Article
Times cited : (99)

References (62)
  • 1
    • 77951204516 scopus 로고    scopus 로고
    • Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
    • E. Albrechtsen, and J. Hovden Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study Comput Secur 29 2010 432 445
    • (2010) Comput Secur , vol.29 , pp. 432-445
    • Albrechtsen, E.1    Hovden, J.2
  • 2
    • 57649097311 scopus 로고    scopus 로고
    • Information security management: A human challenge?
    • D. Ashenden Information security management: a human challenge? Inf Secur Tech Rep 13 2008 195 201
    • (2008) Inf Secur Tech Rep , vol.13 , pp. 195-201
    • Ashenden, D.1
  • 3
    • 84888884622 scopus 로고    scopus 로고
    • CISOs and organisational culture: Their own worst enemy?
    • D. Ashenden, and A. Sasse CISOs and organisational culture: their own worst enemy? Comput Secur 39 2013 396 405
    • (2013) Comput Secur , vol.39 , pp. 396-405
    • Ashenden, D.1    Sasse, A.2
  • 7
    • 35148886676 scopus 로고    scopus 로고
    • An information security governance framework
    • A. Da Veiga, and J.H.P. Eloff An information security governance framework Inf Syst Manag 24 4 2007 361 372
    • (2007) Inf Syst Manag , vol.24 , Issue.4 , pp. 361-372
    • Da Veiga, A.1    Eloff, J.H.P.2
  • 8
    • 74449092722 scopus 로고    scopus 로고
    • A framework and assessment instrument for Information Security Culture
    • A. Da Veiga, and J.H.P. Eloff A framework and assessment instrument for Information Security Culture Comput Secur 29 2010 196 207
    • (2010) Comput Secur , vol.29 , pp. 196-207
    • Da Veiga, A.1    Eloff, J.H.P.2
  • 9
    • 74449084015 scopus 로고    scopus 로고
    • Information security culture - Validation of an assessment instrument
    • A. Da Veiga, N. Martins, and J.H.P. Eloff Information security culture - validation of an assessment instrument South Afr Bus Rev 11 1 2007 147 166
    • (2007) South Afr Bus Rev , vol.11 , Issue.1 , pp. 147-166
    • Da Veiga, A.1    Martins, N.2    Eloff, J.H.P.3
  • 11
    • 70350590572 scopus 로고    scopus 로고
    • Fostering information security culture in small and medium size enterprises: An interpretive study in Australia
    • Paper 120, from
    • S. Dojkovski, S. Lichtenstein, and M.J. Warren Fostering information security culture in small and medium size enterprises: an interpretive study in Australia ECIS 2007 Proceedings 2007 Paper 120, from http://aisel.aisnet.org/ecis2007/120
    • (2007) ECIS 2007 Proceedings
    • Dojkovski, S.1    Lichtenstein, S.2    Warren, M.J.3
  • 12
    • 33846807812 scopus 로고    scopus 로고
    • Value-focused assessment of ICT security awareness in an academic environment
    • L. Drevin, H.A. Kruger, and T. Steyn Value-focused assessment of ICT security awareness in an academic environment Comput Secur 26 2007 36 43
    • (2007) Comput Secur , vol.26 , pp. 36-43
    • Drevin, L.1    Kruger, H.A.2    Steyn, T.3
  • 13
    • 84898078970 scopus 로고    scopus 로고
    • Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
    • W.R. Flores, E. Antonsen, and M. Ekstedt Information security knowledge sharing in organizations: investigating the effect of behavioral information security governance and national culture Comput Secur 43 2014 90 110
    • (2014) Comput Secur , vol.43 , pp. 90-110
    • Flores, W.R.1    Antonsen, E.2    Ekstedt, M.3
  • 14
    • 84870299131 scopus 로고    scopus 로고
    • Power to the people? the evolving recognition of human aspects of security
    • S. Furnell, and N. Clarke Power to the people? the evolving recognition of human aspects of security Comput Secur 31 2012 983 988
    • (2012) Comput Secur , vol.31 , pp. 983-988
    • Furnell, S.1    Clarke, N.2
  • 15
    • 84862128773 scopus 로고    scopus 로고
    • Understanding the influences on information security behavior
    • S. Furnell, and A. Rajendran Understanding the influences on information security behavior Comput Fraud Secur 2012; March 12 15
    • (2012) Comput Fraud Secur , pp. 12-15
    • Furnell, S.1    Rajendran, A.2
  • 16
    • 61349200300 scopus 로고    scopus 로고
    • From culture to disobedience: Recognising the varying user acceptance of IT security
    • S. Furnell, and K. Thomson From culture to disobedience: recognising the varying user acceptance of IT security Comput Fraud Secur Feb 2009 5 10
    • (2009) Comput Fraud Secur , pp. 5-10
    • Furnell, S.1    Thomson, K.2
  • 17
    • 0034318873 scopus 로고    scopus 로고
    • Practical approaches to creating a security culture
    • N. Gaunt Practical approaches to creating a security culture Int J Med Inform 60 2 2000 151 157
    • (2000) Int J Med Inform , vol.60 , Issue.2 , pp. 151-157
    • Gaunt, N.1
  • 18
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • T. Herath, and H.R. Rao Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness Decis Support Syst 47 2009 154 165
    • (2009) Decis Support Syst , vol.47 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 22
    • 84887852395 scopus 로고    scopus 로고
    • Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
    • P. Ifinedo Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition Inf Manag 51 2014 69 79
    • (2014) Inf Manag , vol.51 , pp. 69-79
    • Ifinedo, P.1
  • 25
    • 84897443241 scopus 로고    scopus 로고
    • An exploratory investigation of message person congruence in information security awareness campaigns
    • M. Kajzer, J. D'Arcy, C.R. Crowell, A. Striegel, and D. Van Bruggen An exploratory investigation of message person congruence in information security awareness campaigns Comput Secur 43 2014 64 76
    • (2014) Comput Secur , vol.43 , pp. 64-76
    • Kajzer, M.1    D'Arcy, J.2    Crowell, C.R.3    Striegel, A.4    Van Bruggen, D.5
  • 26
    • 70349448077 scopus 로고    scopus 로고
    • Human and organizational factors in computer and information security: Pathways to vulnerabilities
    • S. Kraemer, P. Carayon, and J. Clem Human and organizational factors in computer and information security: pathways to vulnerabilities Comput Secur 28 2009 509 520
    • (2009) Comput Secur , vol.28 , pp. 509-520
    • Kraemer, S.1    Carayon, P.2    Clem, J.3
  • 27
    • 0000629876 scopus 로고
    • Determining sample size for research activities
    • R.V. Krejcie, and D.W. Morgan Determining sample size for research activities Educ Psychol Meas 30 1970 607 610
    • (1970) Educ Psychol Meas , vol.30 , pp. 607-610
    • Krejcie, R.V.1    Morgan, D.W.2
  • 28
    • 53049084670 scopus 로고    scopus 로고
    • Information security management: An information security retrieval and awareness model for industry
    • E. Kritzinger, and E. Smith Information security management: an information security retrieval and awareness model for industry Comput Secur 27 2008 224 231
    • (2008) Comput Secur , vol.27 , pp. 224-231
    • Kritzinger, E.1    Smith, E.2
  • 29
    • 78650858558 scopus 로고    scopus 로고
    • Information security culture in small and medium-sized enterprises
    • R. Kuusisto, and I. Ilvonen Information security culture in small and medium-sized enterprises Front E-business Res 2003 from http://www.academia.edu/1075891/Information-security-culture-in-small-and-medium-size-enterprises
    • (2003) Front E-business Res
    • Kuusisto, R.1    Ilvonen, I.2
  • 30
    • 84870529816 scopus 로고    scopus 로고
    • (M.Com thesis) Rand Afrikaans University Johannesburg
    • A. Martins Information security culture (M.Com thesis) 2002 Rand Afrikaans University Johannesburg
    • (2002) Information Security Culture
    • Martins, A.1
  • 33
    • 0033745439 scopus 로고    scopus 로고
    • Implementing information security in the 21st century - Do you have the balancing factors?
    • J.D. Nosworthy Implementing information security in the 21st century - do you have the balancing factors? Comput Secur 19 4 2000 337 347
    • (2000) Comput Secur , vol.19 , Issue.4 , pp. 337-347
    • Nosworthy, J.D.1
  • 35
    • 84925652050 scopus 로고    scopus 로고
    • Oxford. See the Concise Oxford Dictionary
    • Oxford. See the Concise Oxford Dictionary.
  • 36
    • 84862271726 scopus 로고    scopus 로고
    • Taxonomy of compliant information security behavior
    • K. Padayachee Taxonomy of compliant information security behavior Comput Secur 31 2012 673 680
    • (2012) Comput Secur , vol.31 , pp. 673-680
    • Padayachee, K.1
  • 38
    • 84897916714 scopus 로고    scopus 로고
    • Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)
    • K. Parsons, A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q) Comput Secur 42 2014 165 176
    • (2014) Comput Secur , vol.42 , pp. 165-176
    • Parsons, K.1    McCormac, A.2    Butavicius, M.3    Pattinson, M.4    Jerram, C.5
  • 40
    • 85027371331 scopus 로고    scopus 로고
    • Pricewaterhousecoopers (pwc)
    • PricewaterhouseCoopers (PwC) The global state of information security survey 2014 from http://www.pwc.com/gx/en/consulting-services/information-security-survey/download.jhtml
    • (2014) The Global State of Information Security Survey
  • 41
    • 55849105212 scopus 로고    scopus 로고
    • Information security awareness in higher education: An exploratory study
    • Y. Rezgui, and A. Marks Information security awareness in higher education: an exploratory study Comput Secur 27 2008 241 253
    • (2008) Comput Secur , vol.27 , pp. 241-253
    • Rezgui, Y.1    Marks, A.2
  • 44
    • 78650874414 scopus 로고    scopus 로고
    • Information security culture. in security in the Information Society
    • Kluwer Academic Boston
    • T. Schlienger, and S. Teufel Information security culture. In security in the Information Society IFIP/SEC2002 2002 Kluwer Academic Boston 191 201
    • (2002) IFIP/SEC2002 , pp. 191-201
    • Schlienger, T.1    Teufel, S.2
  • 48
    • 84911969074 scopus 로고    scopus 로고
    • IBM Software Group, ATTN Licensing, 200 W. Madison St. Chicago, IL; 60606, U.S.A
    • SPSS version 22 2013 IBM Software Group, ATTN Licensing, 200 W. Madison St. Chicago, IL; 60606, U.S.A
    • (2013) SPSS Version 22
  • 50
    • 0000280419 scopus 로고
    • Effective is security: An empirical study
    • D.W. Straub Effective IS security: an empirical study Inf Syst Res 1 1990 255 276
    • (1990) Inf Syst Res , vol.1 , pp. 255-276
    • Straub, D.W.1
  • 51
    • 13244286108 scopus 로고    scopus 로고
    • Validation guidelines for is positivist research
    • D. Straub, M. Boudreau, and D. Gefen Validation guidelines for IS positivist research Commun Assoc Inf Syst 13 24 2004 380 427
    • (2004) Commun Assoc Inf Syst , vol.13 , Issue.24 , pp. 380-427
    • Straub, D.1    Boudreau, M.2    Gefen, D.3
  • 52
    • 84925676791 scopus 로고    scopus 로고
    • Training Technologies Inc from
    • Survey tracker 2014 Training Technologies Inc from https://www.surveytracker.com/
    • (2014) Survey Tracker
  • 54
    • 15744368808 scopus 로고    scopus 로고
    • Information security obedience: A definition
    • K. Thomson, and R. Von Solms Information security obedience: a definition Comput Secur 24 1 2005 69 75
    • (2005) Comput Secur , vol.24 , Issue.1 , pp. 69-75
    • Thomson, K.1    Von Solms, R.2
  • 55
    • 33750923703 scopus 로고    scopus 로고
    • Cultivating an organisational information security culture
    • K. Thomson, R. Van Solms, and L. Louw Cultivating an organisational information security culture Comput Fraud Secur 2006; October 7 11
    • (2006) Comput Fraud Secur , pp. 7-11
    • Thomson, K.1    Van Solms, R.2    Louw, L.3
  • 57
    • 77951209282 scopus 로고    scopus 로고
    • Information security culture: A management perspective
    • J. Van Niekerk, and R. Von Solms Information security culture: a management perspective Comput Secur 29 2010 476 486
    • (2010) Comput Secur , vol.29 , pp. 476-486
    • Van Niekerk, J.1    Von Solms, R.2
  • 60
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • C. Vroom, and R. Von Solms Towards information security behavioural compliance Comput Secur 23 3 2004 191 198
    • (2004) Comput Secur , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 61
    • 0002763032 scopus 로고    scopus 로고
    • The high-performance organizational climate: How workers describe top-performing units
    • N.M. Ashkanasy, C.P.M. Wilderom, M.F. Peterson, Sage Publications California
    • C.P.M. Wiley, and S.M. Brooks The high-performance organizational climate: how workers describe top-performing units N.M. Ashkanasy, C.P.M. Wilderom, M.F. Peterson, Handbook of organisational culture and climate 2000 Sage Publications California p117 192
    • (2000) Handbook of Organisational Culture and Climate , pp. p117-192
    • Wiley, C.P.M.1    Brooks, S.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.