메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Disclosure of organizational information on social media: Perspectives from security managers

Author keywords

Information leakage; Information security management; Online social networking; Social media

Indexed keywords

INDUSTRIAL MANAGEMENT; MOBILE SECURITY; SECURITY OF DATA; SOCIETIES AND INSTITUTIONS;

EID: 84928492230     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (45)
  • 1
    • 84870387706 scopus 로고    scopus 로고
    • Understanding the factors of information leakage through online social networking to safeguard organizational information
    • Paper presented at the, Brisbane, Australia
    • Abdul Molok, N.N., Ahmad, A. & Chang, S. (2010). Understanding the factors of information leakage through online social networking to safeguard organizational information. Paper presented at the 21st Australasian Conference on Information Systems (ACIS2010), Brisbane, Australia.
    • (2010) 21st Australasian Conference on Information Systems (ACIS2010)
    • Abdul Molok, N.N.1    Ahmad, A.2    Chang, S.3
  • 2
    • 84869109416 scopus 로고    scopus 로고
    • Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks
    • Paper presented at the, Sydney, Australia
    • Abdul Molok, N.N., Ahmad, A. & Chang, S. (2011). Disclosure of organizational information by employees on Facebook: Looking at the potential for information security risks. Paper presented at the 22nd Australasian Conference on Information Systems (ACIS2011), Sydney, Australia.
    • (2011) 22nd Australasian Conference on Information Systems (ACIS2011)
    • Abdul Molok, N.N.1    Ahmad, A.2    Chang, S.3
  • 4
    • 84880885221 scopus 로고    scopus 로고
    • Alexa Internet, Inc. Retrieved 13 April 2013
    • Alexa. (2013). Alexa top 500 global sites. Alexa Internet, Inc. Retrieved 13 April 2013, from http://www.alexa.com/topsites
    • (2013) Alexa Top 500 Global Sites
    • Alexa.1
  • 8
    • 37249053884 scopus 로고    scopus 로고
    • Social network sites: Definition, history, and scholarship
    • Boyd, D. & Ellison, N. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210-230.
    • (2007) Journal of Computer-Mediated Communication , vol.13 , Issue.1 , pp. 210-230
    • Boyd, D.1    Ellison, N.2
  • 9
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcu, B., Cavusoglu, H. & Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-based Beliefs and Information Security Awareness. MIS Quarterly, 34(3), 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 10
    • 77956652072 scopus 로고    scopus 로고
    • Human factors in information security: The insider threat-Who can you trust these days?
    • Colwill, C. (2009). Human factors in information security: The insider threat-Who can you trust these days? Information Security Technical Report, 14(4), 186-196.
    • (2009) Information Security Technical Report , vol.14 , Issue.4 , pp. 186-196
    • Colwill, C.1
  • 11
    • 77950821999 scopus 로고    scopus 로고
    • Motivations for social networking at work
    • November 8-12, 2008, Paper presented at the, San Diego, CA
    • DiMicco, J., Millen, D.R., Geyer, W., Dugan, C., Brownholtz, B. & Muller, M. (2008, November 8-12, 2008). Motivations for Social Networking at Work. Paper presented at the CSCW '08, San Diego, CA.
    • (2008) CSCW '08
    • Dimicco, J.1    Millen, D.R.2    Geyer, W.3    Dugan, C.4    Brownholtz, B.5    Muller, M.6
  • 17
    • 84870433973 scopus 로고    scopus 로고
    • Online social networks: A survey of a global phenomenon
    • Heidemann, J., Klier, M. & Probst, F. (2012). Online social networks: A survey of a global phenomenon. Computer Networks, 56, 3866-3878.
    • (2012) Computer Networks , vol.56 , pp. 3866-3878
    • Heidemann, J.1    Klier, M.2    Probst, F.3
  • 23
    • 0242267471 scopus 로고    scopus 로고
    • A perspective on jugdment and choice: Mapping bounded rationality
    • Kahneman, D. (2003). A perspective on jugdment and choice: Mapping bounded rationality. American Psychologist, 58(9), 697-720.
    • (2003) American Psychologist , vol.58 , Issue.9 , pp. 697-720
    • Kahneman, D.1
  • 24
    • 84924444643 scopus 로고
    • Government information leaks and the First Amendment
    • Katz, A.M. (1976). Government information leaks and the First Amendment. California Law Review, 64(108), 108-145.
    • (1976) California Law Review , vol.64 , Issue.108 , pp. 108-145
    • Katz, A.M.1
  • 25
    • 0001399707 scopus 로고    scopus 로고
    • Qualitative research in organizational and vocational psychology, 1979-1999
    • Lee, T.W., Mitchell, T.R. & Sablynski, C.J. (1999). Qualitative research in organizational and vocational psychology, 1979-1999. Journal of Vocational Behavior, 55(161-187).
    • (1999) Journal of Vocational Behavior , vol.55 , pp. 161-187
    • Lee, T.W.1    Mitchell, T.R.2    Sablynski, C.J.3
  • 27
    • 0000133760 scopus 로고
    • Threats to information systems: Today's reality, yesterday's understanding
    • Loch, K.D., Carr, H.H. & Warkentin, M.E. (1992). Threats to Information Systems: Today's Reality, Yesterday's Understanding. MIS Quarterly, 16(2), 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.E.3
  • 28
  • 29
    • 76949093866 scopus 로고    scopus 로고
    • All about me: Disclosure in online social networking profiles: The case of FACEBOOK
    • Nosko, A., Wood, E., & Molema, S. (2010). All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior, 26, 406-418.
    • (2010) Computers in Human Behavior , vol.26 , pp. 406-418
    • Nosko, A.1    Wood, E.2    Molema, S.3
  • 31
    • 84861101642 scopus 로고    scopus 로고
    • Leveraging behavioral science to mitigate cyber security risk
    • Pfleeger, S.L. & Caputo, D.D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31, 597-611.
    • (2012) Computers & Security , vol.31 , pp. 597-611
    • Pfleeger, S.L.1    Caputo, D.D.2
  • 33
    • 84928499326 scopus 로고    scopus 로고
    • The psychology of security
    • Schneier, B. (2008). The Psychology of Security. Schneier on Security, from http://www.schneier.com/essay-155.html
    • (2008) Schneier on Security
    • Schneier, B.1
  • 34
    • 84862930210 scopus 로고    scopus 로고
    • Case study: Using security awareness to combat the advanced persistent threat
    • Paper presented at the, University of Alaska, Fairbanks, Seattle
    • Smith, A.M. & Toppel, N.Y. (2009). Case study: Using security awareness to combat the advanced persistent threat. Paper presented at the 13th Colloquium for Information Systems Security Education (CISSE), University of Alaska, Fairbanks, Seattle.
    • (2009) 13th Colloquium for Information Systems Security Education (CISSE)
    • Smith, A.M.1    Toppel, N.Y.2
  • 37
    • 0000280419 scopus 로고
    • Effective is security
    • Straub, D. (1990). Effective IS Security. Information Systems Research, 1(3), 255-276.
    • (1990) Information Systems Research , vol.1 , Issue.3 , pp. 255-276
    • Straub, D.1
  • 40
    • 84876846718 scopus 로고    scopus 로고
    • Facebook: The making of 1 billion users
    • Retrieved 15 February 2013, from
    • Vance, A. (2012). Facebook: The making of 1 billion users. Business Week Retrieved 15 February 2013, from http://www.businessweek.com/printer/articles/74602-facebook-the-making-of-1-billion-users
    • (2012) Business Week
    • Vance, A.1
  • 41
    • 42149161709 scopus 로고    scopus 로고
    • The psychology of security: Why do good users make bad decisions?
    • West, R. (2008). The psychology of security: Why do good users make bad decisions? Communications of the ACM, 51(4), 34-40.
    • (2008) Communications of the ACM , vol.51 , Issue.4 , pp. 34-40
    • West, R.1
  • 43
    • 67650083389 scopus 로고    scopus 로고
    • Social networking: The business case
    • June 2009
    • Wilson, J. (2009). Social Networking: The Business Case. Engineering & Technology, June 2009, 54-56.
    • (2009) Engineering & Technology , pp. 54-56
    • Wilson, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.