메뉴 건너뛰기




Volumn , Issue 110383, 2014, Pages

Sensitizing Employees' Corporate IS Security Risk Perception

Author keywords

bring your own cloud; IS policy; Security risk perception; shadow IT; social influence

Indexed keywords

DISTRIBUTED DATABASE SYSTEMS; ECONOMIC AND SOCIAL EFFECTS; PERSONNEL; RISK ASSESSMENT; SOCIAL ASPECTS; SURVEYS; WEB SERVICES;

EID: 84930236649     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (69)
  • 2
    • 0000357545 scopus 로고
    • Estimating Nonresponse Bias in Mail Surveys
    • Armstrong, J. S., and Overton, T. S. 1977. “Estimating Nonresponse Bias in Mail Surveys,” Journal of Marketing Research (14:3), pp. 396-402.
    • (1977) Journal of Marketing Research , vol.14 , Issue.3 , pp. 396-402
    • Armstrong, J.S.1    Overton, T.S.2
  • 5
    • 58849132056 scopus 로고    scopus 로고
    • Shadow systems: The Good, The Bad and The Ugly
    • Behrens, S. 2009. “Shadow systems: The Good, The Bad and The Ugly,” Communications of the ACM (52:2), pp. 124-129.
    • (2009) Communications of the ACM , vol.52 , Issue.2 , pp. 124-129
    • Behrens, S.1
  • 7
    • 77957061746 scopus 로고    scopus 로고
    • Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
    • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. 2010. “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,” MIS Quarterly (34:3), pp. 523-548.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 8
    • 21144461918 scopus 로고
    • Data Analysis Strategies for Mixed-Method Evaluation Designs
    • Caracelli, V. J., and Greene, J. C. 1993. “Data Analysis Strategies for Mixed-Method Evaluation Designs,” Educational Evaluation and Policy Analysis (15:2), pp. 195-207.
    • (1993) Educational Evaluation and Policy Analysis , vol.15 , Issue.2 , pp. 195-207
    • Caracelli, V.J.1    Greene, J.C.2
  • 9
    • 0003095695 scopus 로고    scopus 로고
    • The partial least squares approach to structural equation modeling
    • G. A. Marcoulides (ed.), (. Mahwah, NJ: Lawrence Erlbaum
    • Chin, W. W. 1998. “The partial least squares approach to structural equation modeling,” in Modern Methods for Business Research, G. A. Marcoulides (ed.), (Vol. 295) Mahwah, NJ: Lawrence Erlbaum, pp. 295-336.
    • (1998) Modern Methods for Business Research , vol.295 , pp. 295-336
    • Chin, W.W.1
  • 11
    • 84903215189 scopus 로고    scopus 로고
    • Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap
    • Crossler, R. E., Long, J. H., Loraas, T. M., and Trinkle, B. S. 2014. “Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap,” Journal of Information Systems (28:1), pp. 209-226.
    • (2014) Journal of Information Systems , vol.28 , Issue.1 , pp. 209-226
    • Crossler, R.E.1    Long, J.H.2    Loraas, T.M.3    Trinkle, B.S.4
  • 12
    • 67649551429 scopus 로고    scopus 로고
    • User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
    • D'Arcy, J., Hovav, A., and Galletta, D. 2009. “User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach,” Information Systems Research (20:1), pp. 79-98.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 14
    • 62949117569 scopus 로고    scopus 로고
    • Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption
    • Eckhardt, A., Laumer, S., and Weitzel, T. 2009. “Who influences whom? Analyzing workplace referents' social influence on IT adoption and non-adoption,” Journal of Information Technology (24:1), pp. 11-24.
    • (2009) Journal of Information Technology , vol.24 , Issue.1 , pp. 11-24
    • Eckhardt, A.1    Laumer, S.2    Weitzel, T.3
  • 16
    • 0001774151 scopus 로고    scopus 로고
    • The Impact of Developer Responsiveness on Perceptions of Usefulness and Ease of Use: An Extension of the Technology Acceptance Model
    • Gefen, D., and Keil, M. 1998. “The Impact of Developer Responsiveness on Perceptions of Usefulness and Ease of Use: An Extension of the Technology Acceptance Model,” The DATA BASE for Advances in Information Systems (29:2), pp. 35-49.
    • (1998) The DATA BASE for Advances in Information Systems , vol.29 , Issue.2 , pp. 35-49
    • Gefen, D.1    Keil, M.2
  • 20
    • 81255163048 scopus 로고    scopus 로고
    • Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model
    • Guo, K. H., Yuan, Y., Archer, N. P., and Connelly, C. E. 2011. “Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model,” Journal of Management Information Systems (28:2), pp. 203-236.
    • (2011) Journal of Management Information Systems , vol.28 , Issue.2 , pp. 203-236
    • Guo, K.H.1    Yuan, Y.2    Archer, N.P.3    Connelly, C.E.4
  • 22
    • 84928616214 scopus 로고    scopus 로고
    • Organizational cloud service adoption: a scientometric and content-based literature analysis
    • Haag, S., and Eckhardt, A. 2014. “Organizational cloud service adoption: a scientometric and content-based literature analysis,” Journal of Business Economics (84:3), pp. 407-440.
    • (2014) Journal of Business Economics , vol.84 , Issue.3 , pp. 407-440
    • Haag, S.1    Eckhardt, A.2
  • 23
    • 84902256176 scopus 로고    scopus 로고
    • From the Ground to the Cloud - A Structured Literature Analysis of the Cloud Service Landscape around the Public and Private Sector
    • Big Island, Hawaii
    • Haag, S., Eckhardt, A., and Krönung, J. 2014. “From the Ground to the Cloud - A Structured Literature Analysis of the Cloud Service Landscape around the Public and Private Sector,” in Proceedings of the 47th Hawaii International Conference on System Sciences, Big Island, Hawaii.
    • (2014) Proceedings of the 47th Hawaii International Conference on System Sciences
    • Haag, S.1    Eckhardt, A.2    Krönung, J.3
  • 25
    • 0000917858 scopus 로고    scopus 로고
    • The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions
    • Harrington, S. J. 1996. “The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions,” MIS Quarterly (20:3), pp. 257-278.
    • (1996) MIS Quarterly , vol.20 , Issue.3 , pp. 257-278
    • Harrington, S.J.1
  • 26
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: a framework for security policy compliance in organisations
    • Herath, T., and Rao, H. R. 2009a. “Protection motivation and deterrence: a framework for security policy compliance in organisations,” European Journal of Information Systems (18:2), pp. 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 27
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • Herath, T., and Rao, H. R. 2009b. “Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness,” Decision Support Systems (47:2), pp. 154-165.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 30
    • 84859105508 scopus 로고    scopus 로고
    • Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
    • Hovav, A., and D'Arcy, J. 2012. “Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea,” Information & Management (49:2), pp. 99-110.
    • (2012) Information & Management , vol.49 , Issue.2 , pp. 99-110
    • Hovav, A.1    D'Arcy, J.2
  • 31
    • 84863542038 scopus 로고    scopus 로고
    • Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture
    • Hu, Q., Dinev, T., Hart, P., and Cooke, D. 2012. “Managing Employee Compliance with Information Security Policies: The Critical Role of Top Management and Organizational Culture,” Decision Sciences (43:4), pp. 615-660.
    • (2012) Decision Sciences , vol.43 , Issue.4 , pp. 615-660
    • Hu, Q.1    Dinev, T.2    Hart, P.3    Cooke, D.4
  • 32
    • 79959944364 scopus 로고    scopus 로고
    • Does deterrence work in reducing information security policy abuse by employees?
    • Hu, Q., Xu, Z., Dinev, T., and Ling, H. 2011. “Does deterrence work in reducing information security policy abuse by employees?,” Communications of the ACM (54:6), pp. 54-60.
    • (2011) Communications of the ACM , vol.54 , Issue.6 , pp. 54-60
    • Hu, Q.1    Xu, Z.2    Dinev, T.3    Ling, H.4
  • 33
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    • Ifinedo, P. 2012. “Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory,” Computers & Security (31:1), pp. 83-95.
    • (2012) Computers & Security , vol.31 , Issue.1 , pp. 83-95
    • Ifinedo, P.1
  • 34
    • 34249670742 scopus 로고    scopus 로고
    • An empirical investigation into the utilization-based information technology success model: integrating task-performance and social influence perspective
    • Kim, C., Jahng, J., and Lee, J. 2006. “An empirical investigation into the utilization-based information technology success model: integrating task-performance and social influence perspective,” Journal of Information Technology (22:2), pp. 152-160.
    • (2006) Journal of Information Technology , vol.22 , Issue.2 , pp. 152-160
    • Kim, C.1    Jahng, J.2    Lee, J.3
  • 35
    • 84870064352 scopus 로고    scopus 로고
    • Laredo, TX: ScriptWarp Systems. Accessed 15 Dec 2013
    • Kock, N. 2012. “WarpPLS 3.0 User Manual,” Laredo, TX: ScriptWarp Systems. http://www.scriptwarp.com/warppls/. Accessed 15 Dec 2013
    • (2012) WarpPLS 3.0 User Manual
    • Kock, N.1
  • 37
    • 26444498526 scopus 로고    scopus 로고
    • Normative Controls and Self‐Reported Counterproductive Behaviors in the Workplace in China
    • Kwok, C.-K., Au, W. T., and Ho, J. M. C. 2005. “Normative Controls and Self‐Reported Counterproductive Behaviors in the Workplace in China,” Applied Psychology: An International Review (54:4), pp. 456-475.
    • (2005) Applied Psychology: An International Review , vol.54 , Issue.4 , pp. 456-475
    • Kwok, C.-K.1    Au, W.T.2    Ho, J.M.C.3
  • 39
    • 2342489402 scopus 로고    scopus 로고
    • An integrative model of computer abuse based on social control and general deterrence theories
    • Lee, S. M., Lee, S.-G., and Yoo, S. 2004. “An integrative model of computer abuse based on social control and general deterrence theories,” Information & Management (41:6), pp. 707-718.
    • (2004) Information & Management , vol.41 , Issue.6 , pp. 707-718
    • Lee, S.M.1    Lee, S.-G.2    Yoo, S.3
  • 40
    • 0000133760 scopus 로고
    • Threats to Information Systems: Today' s Reality, Yesterday' s Understanding
    • Loch, K. D., Carr, H. H., and Warkentin, M. 1992. “Threats to Information Systems: Today' s Reality, Yesterday' s Understanding,” MIS Quarterly (16:2), pp. 173-186.
    • (1992) MIS Quarterly , vol.16 , Issue.2 , pp. 173-186
    • Loch, K.D.1    Carr, H.H.2    Warkentin, M.3
  • 41
    • 84973830765 scopus 로고
    • Some benefits of integrating qualitative and quantitative methods in program evaluation, with illustrations
    • Madey, D. 1982. “Some benefits of integrating qualitative and quantitative methods in program evaluation, with illustrations,” Educational Evaluation and Policy Analysis (4:2), pp. 223-236.
    • (1982) Educational Evaluation and Policy Analysis , vol.4 , Issue.2 , pp. 223-236
    • Madey, D.1
  • 42
    • 13244298307 scopus 로고    scopus 로고
    • Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
    • Malhotra, N. K., Kim, S. S., and Agarwal, J. 2004. “Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model,” Information Systems Research (15:4), pp. 336-355.
    • (2004) Information Systems Research , vol.15 , Issue.4 , pp. 336-355
    • Malhotra, N.K.1    Kim, S.S.2    Agarwal, J.3
  • 44
    • 85135922418 scopus 로고    scopus 로고
    • IT's new concern: the personal cloud
    • Accessed 25 April 2014
    • Mitchell, R. L. 2013. “IT's new concern: the personal cloud,” Computerworld, http://www.computerworld.com/s/article/9239348/IT_s_new_concern_The_personal_cloud?taxonomyId=220&pageNumber=1. Accessed 25 April 2014
    • (2013) Computerworld
    • Mitchell, R.L.1
  • 45
    • 33846313618 scopus 로고    scopus 로고
    • The qualitative interview in IS research: Examining the craft
    • Myers, M. D., and Newman, M. 2007. “The qualitative interview in IS research: Examining the craft,” Information and Organization (17:1), pp. 2-26.
    • (2007) Information and Organization , vol.17 , Issue.1 , pp. 2-26
    • Myers, M.D.1    Newman, M.2
  • 46
    • 67650143327 scopus 로고    scopus 로고
    • What levels of moral reasoning and values explain adherence to information security rules? An empirical study
    • Nature Publishing Group
    • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., and Vance, A. 2009. “What levels of moral reasoning and values explain adherence to information security rules? An empirical study,” European Journal of Information Systems (18:2)Nature Publishing Group, pp. 126-139.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 126-139
    • Myyry, L.1    Siponen, M.2    Pahnila, S.3    Vartiainen, T.4    Vance, A.5
  • 50
    • 67649951505 scopus 로고    scopus 로고
    • Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model
    • Pavlou, P. A. 2003. “Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model.,” International Journal of Electronic Commerce (7), pp. 101-134.
    • (2003) International Journal of Electronic Commerce , vol.7 , pp. 101-134
    • Pavlou, P.A.1
  • 51
    • 2442676514 scopus 로고    scopus 로고
    • Building Effective Online Marketplaces with Institution-Based Trust
    • Pavlou, P. A., and Gefen, D. 2004. “Building Effective Online Marketplaces with Institution-Based Trust,” Information Systems Research (15:1), pp. 37-59.
    • (2004) Information Systems Research , vol.15 , Issue.1 , pp. 37-59
    • Pavlou, P.A.1    Gefen, D.2
  • 52
    • 80051795854 scopus 로고    scopus 로고
    • Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
    • Posey, C., Bennett, R. J., and Roberts, T. L. 2011. “Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes,” Computers & Security (30:6-7), pp. 486-497.
    • (2011) Computers & Security , vol.30 , Issue.6-7 , pp. 486-497
    • Posey, C.1    Bennett, R.J.2    Roberts, T.L.3
  • 53
    • 0017980080 scopus 로고
    • A Social Information Processing Approach to Job Attitudes and Task Design
    • June)
    • Salancik, G. R., and Pfeffer, J. 1978. “A Social Information Processing Approach to Job Attitudes and Task Design,” Administrative Science Quarterly (23:June), pp. 224-253.
    • (1978) Administrative Science Quarterly , vol.23 , pp. 224-253
    • Salancik, G.R.1    Pfeffer, J.2
  • 55
    • 0033201389 scopus 로고    scopus 로고
    • Augmenting the Theory of Planned Behavior: Roles for Anticipated Regret and Descriptive Norms
    • Sheeran, P., and Orbell, S. 1999. “Augmenting the Theory of Planned Behavior: Roles for Anticipated Regret and Descriptive Norms,” Journal of Applied Social Psychology (29:10), pp. 2107-2142.
    • (1999) Journal of Applied Social Psychology , vol.29 , Issue.10 , pp. 2107-2142
    • Sheeran, P.1    Orbell, S.2
  • 57
    • 84970352082 scopus 로고
    • The Integration of Fieldwork and Survey Methods
    • Sieber, S. D. 1973. “The Integration of Fieldwork and Survey Methods,” American Journal of Sociology (78:6), pp. 1335-1359.
    • (1973) American Journal of Sociology , vol.78 , Issue.6 , pp. 1335-1359
    • Sieber, S.D.1
  • 58
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New Insights into the Problem of Employee Information Systems Security
    • Siponen, M., and Vance, A. 2010. “Neutralization: New Insights into the Problem of Employee Information Systems Security,” MIS Quarterly (34:3), pp. 487-502.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487-502
    • Siponen, M.1    Vance, A.2
  • 60
    • 0002699431 scopus 로고
    • Discovering and Disciplining Computer Abuse in Organizations: A Field Study
    • Straub, D. W. J., and Nance, W. D. 1990. “Discovering and Disciplining Computer Abuse in Organizations: A Field Study,” MIS Quarterly (14:1), pp. 45-60.
    • (1990) MIS Quarterly , vol.14 , Issue.1 , pp. 45-60
    • Straub, D.W.J.1    Nance, W.D.2
  • 61
    • 0001133137 scopus 로고    scopus 로고
    • Coping With Systems Risk: Security Planning Models for Management Decision Making
    • Straub, D. W., and Welke, R. J. 1998. “Coping With Systems Risk: Security Planning Models for Management Decision Making,” MIS Quarterly (22:4), pp. 441-469.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.W.1    Welke, R.J.2
  • 64
    • 10444236138 scopus 로고    scopus 로고
    • Encouraging citizen adoption of e-government by building trust
    • Warkentin, M., Gefen, D., Pavlou, P. A., and Rose, G. M. 2002. “Encouraging citizen adoption of e-government by building trust,” Electronic Markets (12:3), pp. 157-162.
    • (2002) Electronic Markets , vol.12 , Issue.3 , pp. 157-162
    • Warkentin, M.1    Gefen, D.2    Pavlou, P.A.3    Rose, G.M.4
  • 65
    • 79955622246 scopus 로고    scopus 로고
    • The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
    • Warkentin, M., Johnston, A. C., and Shropshire, J. 2011. “The influence of the informal social learning environment on information privacy policy compliance efficacy and intention,” European Journal of Information Systems (20:3), pp. 267-284.
    • (2011) European Journal of Information Systems , vol.20 , Issue.3 , pp. 267-284
    • Warkentin, M.1    Johnston, A.C.2    Shropshire, J.3
  • 66
    • 1242265154 scopus 로고    scopus 로고
    • In defense of the realm: Understanding the threats to information security
    • Whitman, M. E. 2004. “In defense of the realm: Understanding the threats to information security,” International Journal of Information Management (24:1), pp. 43-57.
    • (2004) International Journal of Information Management , vol.24 , Issue.1 , pp. 43-57
    • Whitman, M.E.1
  • 67
    • 84873974226 scopus 로고    scopus 로고
    • Beyond Deterrence: An Expanded View of Employee Computer Abuse
    • Willison, R., and Warkentin, M. 2013. “Beyond Deterrence: An Expanded View of Employee Computer Abuse,” MIS Quarterly (37:1), pp. 1-20.
    • (2013) MIS Quarterly , vol.37 , Issue.1 , pp. 1-20
    • Willison, R.1    Warkentin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.