메뉴 건너뛰기




Volumn , Issue , 2013, Pages

One size does not fit all: Different cultures require different information systems security interventions

Author keywords

Cultures; IS security behavior; IS security training

Indexed keywords

INFORMATION SYSTEMS; MOBILE SECURITY; PERSONNEL TRAINING;

EID: 84928501185     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (55)
  • 1
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of user's view on information security
    • Albrechtsen, E. (2007). A qualitative study of user's view on information security. Computers & Security, 26 (4), 276-289.
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 2
    • 77951204516 scopus 로고    scopus 로고
    • Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
    • Albrechtsen, E. and Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29 (4), 432-445.
    • (2010) Computers & Security , vol.29 , Issue.4 , pp. 432-445
    • Albrechtsen, E.1    Hovden, J.2
  • 4
    • 77950564668 scopus 로고    scopus 로고
    • The compliance budget: Managing security behaviour in organisations. New Security Paradigm Workshop
    • ACM, New York USA
    • Beautement, A., Sasse, M.A. and Wonham, M. (2008). The compliance budget: Managing security behaviour in organisations. New Security Paradigm Workshop. In Proceedings of the 2008 Workshop on New Security Paradigms, p. 47-58, ACM, New York USA.
    • (2008) Proceedings of the 2008 Workshop on New Security Paradigms , pp. 47-58
    • Beautement, A.1    Sasse, M.A.2    Wonham, M.3
  • 5
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • Bulgurcy, B., Cavusoglu, H. and Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34 (3), 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcy, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 7
    • 61349159889 scopus 로고    scopus 로고
    • Perceptions of information security in the workplace: Linking information security climate to compliant behavior
    • Chan, M., Woon, I. and Kankanhalli, A. (2005). Perceptions of information security in the workplace: Linking information security climate to compliant behavior. Journal of Information Privacy & Security, 1 (3), 18-41.
    • (2005) Journal of Information Privacy & Security , vol.1 , Issue.3 , pp. 18-41
    • Chan, M.1    Woon, I.2    Kankanhalli, A.3
  • 8
    • 34848873123 scopus 로고    scopus 로고
    • Deterring internal information systems misuse
    • D'arcy, J. and Hovav, A. (2007). Deterring internal information systems misuse. Communications of the ACM, 50 (10), 113-117.
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 113-117
    • D'arcy, J.1    Hovav, A.2
  • 9
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • D'arcy, J., Hovav, A. and Galletta, D.F. (2008). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20 (1), 79-98.
    • (2008) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'arcy, J.1    Hovav, A.2    Galletta, D.F.3
  • 10
    • 0001009629 scopus 로고    scopus 로고
    • Diagnosing cultural barriers to knowledge management
    • Delong, D.W. and Fahey, L. (2000). Diagnosing cultural barriers to knowledge management. Academy of Management Executive, 14 (4), 113-127.
    • (2000) Academy of Management Executive , vol.14 , Issue.4 , pp. 113-127
    • Delong, D.W.1    Fahey, L.2
  • 11
    • 67650318762 scopus 로고    scopus 로고
    • User behaviour towards protective information technologies: The role of national cultural differences
    • Dinev, T., Goo, J., Hu, Q. and Nam, K. (2009). User behaviour towards protective information technologies: The role of national cultural differences. Information Systems Journal, 19 (4), 391-412.
    • (2009) Information Systems Journal , vol.19 , Issue.4 , pp. 391-412
    • Dinev, T.1    Goo, J.2    Hu, Q.3    Nam, K.4
  • 12
    • 36448952741 scopus 로고    scopus 로고
    • Cognitive science implications for enhancing training effectiveness in a serious gaming context
    • Greitzer, F.I., Kucher, O.A. and Huston, K. (2007). Cognitive science implications for enhancing training effectiveness in a serious gaming context. Journal of Educational Resources in Computing, 7 (3), 1-16.
    • (2007) Journal of Educational Resources in Computing , vol.7 , Issue.3 , pp. 1-16
    • Greitzer, F.I.1    Kucher, O.A.2    Huston, K.3
  • 13
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organizations
    • Herath, T. and Rao, H.R. (2009a). Protection motivation and deterrence: A framework for security policy compliance in organizations. European Journal of Information Systems, 18 (2), 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 14
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness
    • Herath, T. and Rao, H.R. (2009b). Encouraging information security behaviors in organizations: Role of penalties, pressures, and perceived effectiveness. Decision Support Systems, 47 (2), 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 17
    • 0345733273 scopus 로고    scopus 로고
    • Identifying organizational subcultures: An empirical approach
    • Hofstede, G. (1998). Identifying organizational subcultures: An empirical approach. Journal of Management Studies, 35 (1), 1-12.
    • (1998) Journal of Management Studies , vol.35 , Issue.1 , pp. 1-12
    • Hofstede, G.1
  • 18
    • 0002390117 scopus 로고
    • Cultural constraints in management theories
    • Hofstede, G. (1993). Cultural constraints in management theories. Academy of Management Executive, 7 (1), 81-94.
    • (1993) Academy of Management Executive , vol.7 , Issue.1 , pp. 81-94
    • Hofstede, G.1
  • 20
    • 84859105508 scopus 로고    scopus 로고
    • Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
    • Hovav, A. and D'arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information & Management, 49 (2), 99-110.
    • (2012) Information & Management , vol.49 , Issue.2 , pp. 99-110
    • Hovav, A.1    D'arcy, J.2
  • 21
    • 85071343148 scopus 로고    scopus 로고
    • Theories of learning and computer-mediated instructional technologies
    • Hung, D. (2001) Theories of learning and computer-mediated instructional technologies. Educational Media International, 38 (4), 281-287.
    • (2001) Educational Media International , vol.38 , Issue.4 , pp. 281-287
    • Hung, D.1
  • 22
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, A.C. and Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34 (3), 549-566.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 23
    • 80052902327 scopus 로고    scopus 로고
    • Toward a new meta-theory for designing information systems (IS) security training approaches
    • Karjalainen, M. and Siponen, M. (2011). Toward a new meta-theory for designing information systems (IS) security training approaches. Journal of the Association for Information Systems, 12 (8), 518-555.
    • (2011) Journal of the Association for Information Systems , vol.12 , Issue.8 , pp. 518-555
    • Karjalainen, M.1    Siponen, M.2
  • 25
    • 0141860786 scopus 로고    scopus 로고
    • Generalizing generalizability in information systems research
    • Lee, A.S. and Baskerville, R.L. (2003). Generalizing generalizability in information systems research. Information Systems Research, 14 (3), 221-243.
    • (2003) Information Systems Research , vol.14 , Issue.3 , pp. 221-243
    • Lee, A.S.1    Baskerville, R.L.2
  • 26
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee, S.M., Lee, S.G. and Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information Management, 41 (6), 707-718.
    • (2004) Information Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.G.2    Yoo, S.3
  • 27
    • 33846010136 scopus 로고    scopus 로고
    • Review: A review of culture in information systems research: Toward a theory of information technology culture conflict
    • Leidner, D. and Keyworth, T. (2006). Review: A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30 (2), 357-399.
    • (2006) MIS Quarterly , vol.30 , Issue.2 , pp. 357-399
    • Leidner, D.1    Keyworth, T.2
  • 28
    • 75349090403 scopus 로고    scopus 로고
    • Understanding compliance with Internet use policy from the perspective of rational choice theory
    • Li, H., Zhang, J. and Sarathy, R. (2010). Understanding compliance with Internet use policy from the perspective of rational choice theory. Decision Support Systems, 48 (4), 635-645.
    • (2010) Decision Support Systems , vol.48 , Issue.4 , pp. 635-645
    • Li, H.1    Zhang, J.2    Sarathy, R.3
  • 32
    • 33846313618 scopus 로고    scopus 로고
    • The qualitative interview in is research: Examining the craft
    • Myers, M. and Newman, M. (2007). The qualitative interview in IS research: Examining the craft. Information and Organization, 17 (1), 2-26.
    • (2007) Information and Organization , vol.17 , Issue.1 , pp. 2-26
    • Myers, M.1    Newman, M.2
  • 33
    • 0001790514 scopus 로고    scopus 로고
    • Beyond models of national culture in information systems research
    • Myers, M.D. and Tan, F.B. (2002). Beyond models of national culture in information systems research. Journal of Global Information Management, 10 (1), 24-32.
    • (2002) Journal of Global Information Management , vol.10 , Issue.1 , pp. 24-32
    • Myers, M.D.1    Tan, F.B.2
  • 34
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T. and Vance, A. (2009). What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems, 18 (2), 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 36
    • 0010026477 scopus 로고    scopus 로고
    • Social constructivist perspectives on teaching and learning
    • Palincsar, A.S. (1998). Social constructivist perspectives on teaching and learning. Annual Review of Psychology, 49, 345-375.
    • (1998) Annual Review of Psychology , vol.49 , pp. 345-375
    • Palincsar, A.S.1
  • 37
    • 33749347189 scopus 로고    scopus 로고
    • Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior
    • Pavlou, P.A. and Fygenson, M. (2005). Understanding and predicting electronic commerce adoption: An extension of the theory of planned behavior. MIS Quarterly, 30 (1), 115-143.
    • (2005) MIS Quarterly , vol.30 , Issue.1 , pp. 115-143
    • Pavlou, P.A.1    Fygenson, M.2
  • 38
    • 78650770842 scopus 로고    scopus 로고
    • Improving employee's compliance through is security training: An action research study
    • Puhakainen, P. and Siponen, M. (2010). Improving employee's compliance through IS security training: An action research study. MIS Quarterly, 34 (4), 1-23.
    • (2010) MIS Quarterly , vol.34 , Issue.4 , pp. 1-23
    • Puhakainen, P.1    Siponen, M.2
  • 39
    • 76949108035 scopus 로고    scopus 로고
    • Exploring agility in distributed information systems development (ISD) teams: An interpretive study in an offshoring context
    • Sarker, S. and Sarker, S. (2009). Exploring agility in distributed information systems development (ISD) teams: An interpretive study in an offshoring context. Information Systems Research, 20 (3), 440-461.
    • (2009) Information Systems Research , vol.20 , Issue.3 , pp. 440-461
    • Sarker, S.1    Sarker, S.2
  • 40
    • 33845767551 scopus 로고    scopus 로고
    • Actor-networks and business process change failure: An interpretive case study
    • Sarker, S., Sarker, S. and Sidorova, A. (2006). Actor-networks and business process change failure: An interpretive case study. Journal of Management Information Systems, 23 (1), 51-86.
    • (2006) Journal of Management Information Systems , vol.23 , Issue.1 , pp. 51-86
    • Sarker, S.1    Sarker, S.2    Sidorova, A.3
  • 41
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'weakest link' human/computer interaction approach to usable and effective security
    • Sasse, A., Brostoff, S. and Weirich, D. (2001). Transforming the 'weakest link' human/computer interaction approach to usable and effective security. BT Technology Journal, 19 (3), 122-131.
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, A.1    Brostoff, S.2    Weirich, D.3
  • 42
    • 0001307994 scopus 로고    scopus 로고
    • Quality in qualitative research
    • Seale, C. (1999), Quality in qualitative research. Qualitative Inquiry, 5 (4), 465-478.
    • (1999) Qualitative Inquiry , vol.5 , Issue.4 , pp. 465-478
    • Seale, C.1
  • 43
    • 84857005992 scopus 로고    scopus 로고
    • Towards the improved treatment of generalization of knowledge claims in is research: Drawing general conclusions from samples
    • Seddon, P. and Scheepers, R. (2012). Towards the improved treatment of generalization of knowledge claims in IS research: Drawing general conclusions from samples. European Journal of Information Systems, 21 (1), 6-21.
    • (2012) European Journal of Information Systems , vol.21 , Issue.1 , pp. 6-21
    • Seddon, P.1    Scheepers, R.2
  • 44
    • 0002943369 scopus 로고
    • How culture forms, develops and changes
    • Kilmann, R.H., Saxton, M.J., Serpa, R. and Associates Eds, Jossey-Bass, San Francisco
    • Schein, E.H. (1985). How culture forms, develops and changes. In Gaining Control of the Corporate Culture. (Kilmann, R.H., Saxton, M.J., Serpa, R. and Associates Eds.), pp. 17-43, Jossey-Bass, San Francisco.
    • (1985) Gaining Control of the Corporate Culture , pp. 17-43
    • Schein, E.H.1
  • 45
    • 79651475580 scopus 로고    scopus 로고
    • Designing interviews to generate rich data for information systems research
    • Schulze, U. and Avital, A. (2011). Designing interviews to generate rich data for information systems research. Information & Organization, 21 (1), 1-16.
    • (2011) Information & Organization , vol.21 , Issue.1 , pp. 1-16
    • Schulze, U.1    Avital, A.2
  • 48
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • Siponen, M. and Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34 (1), 1-15.
    • (2010) MIS Quarterly , vol.34 , Issue.1 , pp. 1-15
    • Siponen, M.1    Vance, A.2
  • 51
    • 0004259198 scopus 로고    scopus 로고
    • Second edition. Sage Publications, Thousand Oaks CA
    • Stinger, E.T. (1999). Action Research. Second edition. Sage Publications, Thousand Oaks CA.
    • (1999) Action Research
    • Stinger, E.T.1
  • 54
    • 0041864816 scopus 로고    scopus 로고
    • Cross-cultural software production and use: A structurational analysis
    • Walsham, G. (2002). Cross-cultural software production and use: A structurational analysis. MIS Quarterly, 26 (4), 359-380.
    • (2002) MIS Quarterly , vol.26 , Issue.4 , pp. 359-380
    • Walsham, G.1
  • 55
    • 0000533265 scopus 로고
    • Theory construction as disciplined imagination
    • Weick, K.E. (1989). Theory construction as disciplined imagination. Academy of Management Review, 14 (4), 516-531.
    • (1989) Academy of Management Review , vol.14 , Issue.4 , pp. 516-531
    • Weick, K.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.