메뉴 건너뛰기




Volumn , Issue , 2008, Pages 69-79

Identifying differences between security and other IT professionals: A qualitative analysis

Author keywords

Information security culture; Qualitative analysis; Security administration

Indexed keywords

MOBILE SECURITY; SECURITY SYSTEMS;

EID: 84926031369     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (12)
  • 2
    • 30744434347 scopus 로고    scopus 로고
    • An analysis of the growth of computer and internet security breaches
    • Bagchi, K., Udo, G. (2003). An analysis of the growth of computer and internet security breaches. Communications of the AIS, 12(46), p. 684-700.
    • (2003) Communications of the AIS , vol.12 , Issue.46 , pp. 684-700
    • Bagchi, K.1    Udo, G.2
  • 5
    • 84926057436 scopus 로고    scopus 로고
    • Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-science
    • in press
    • Flechais, I. and Sasse, M. (2008). Stakeholder involvement, motivation, responsibility, communication: how to design usable security in e-science. Int. Journal of Human-Computer Studies, in press.
    • (2008) Int. Journal of Human-computer Studies
    • Flechais, I.1    Sasse, M.2
  • 9
    • 33750513188 scopus 로고    scopus 로고
    • Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
    • Kraemer, S. and Carayon, P. (2007). Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Applied Ergonomics, 38, 14, p. 3-154.
    • (2007) Applied Ergonomics , vol.38 , Issue.14 , pp. 3-154
    • Kraemer, S.1    Carayon, P.2
  • 10
    • 0034241415 scopus 로고    scopus 로고
    • Whatever happened to qualitative description?
    • 3
    • Sandelowski, M. (2000) Whatever happened to qualitative description? Research in Nursing & Health, 23(4), 3, p. 34-340.
    • (2000) Research in Nursing & Health , vol.23 , Issue.4 , pp. 34-340
    • Sandelowski, M.1
  • 12
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the design of usable security technologies to the design of useful secure applications
    • Smetters, D. and Grinter, R. (2002). Moving from the design of usable security technologies to the design of useful secure applications. In Proc. of the Workshop on New Security Paradigms, p. 82-89.
    • (2002) Proc. of the Workshop on New Security Paradigms , pp. 82-89
    • Smetters, D.1    Grinter, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.