메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Factors influencing the adoption of cloud incident handling strategy: A preliminary study in Malaysia

Author keywords

Cloud computing; Incident handling; Protection Motivation Theory; Situation Awareness

Indexed keywords

CLOUD COMPUTING; DISTRIBUTED DATABASE SYSTEMS; INFORMATION SYSTEMS; MOTIVATION;

EID: 84963615203     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (46)
  • 1
    • 84916918767 scopus 로고    scopus 로고
    • A survey of information security incident handling in the cloud
    • Ab Rahman, N. H., and Choo, K.-K. R. 2015a. "A Survey of Information Security Incident Handling in the Cloud", Computers & Security (49), pp. 45-69.
    • (2015) Computers & Security , Issue.49 , pp. 45-69
    • Ab Rahman, N.H.1    Choo, K.-K.R.2
  • 2
    • 85050883948 scopus 로고    scopus 로고
    • Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model
    • Ko and K.-K. R. Choo eds., Waltham, MA: Syngress, an Imprint of Elsevier In press
    • Ab Rahman, N. H., and Choo, K.-K. R. 2015b. "Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model", in Cloud Security EcosystemR. Ko and K.-K. R. Choo (eds.), Waltham, MA: Syngress, an Imprint of Elsevier [In press].
    • (2015) Cloud Security EcosystemR
    • Ab Rahman, N.H.1    Choo, K.-K.R.2
  • 3
    • 84963565591 scopus 로고    scopus 로고
    • retrieved February 16, 2014
    • ACCA. 2014. "Cloud Readiness Index 2014 - Executive Summary", Asia Cloud Computing Association (available at http://asiacloudcomputing.org/research/cri2014; retrieved February 16, 2014).
    • (2014) Cloud Readiness Index 2014 - Executive Summary
    • ACCA1
  • 4
    • 0017472917 scopus 로고
    • Self-efficacy: Toward a unifying theory of behavioral change
    • Bandura, A. 1977. "Self-efficacy: Toward a Unifying Theory of Behavioral Change", Psychological Review (84:2), pp. 191-215.
    • (1977) Psychological Review , vol.84 , Issue.2 , pp. 191-215
    • Bandura, A.1
  • 6
    • 84880563297 scopus 로고    scopus 로고
    • A quantitative model for information-security risk management
    • Bojanc, R. 2013. "A Quantitative Model for Information-Security Risk Management", Engineering Management Journal (25:2), pp. 25-37.
    • (2013) Engineering Management Journal , vol.25 , Issue.2 , pp. 25-37
    • Bojanc, R.1
  • 8
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • Choo, K.-K. R. 2011. "The Cyber Threat Landscape: Challenges and Future Research Directions", Computer & Security (30:8), pp. 719-731.
    • (2011) Computer & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 9
    • 84961584112 scopus 로고    scopus 로고
    • Legal issues in the cloud
    • Choo, K.-K. R. 2014. "Legal issues in the cloud", IEEE Cloud Computing Magazine (1:1), pp. 94-96.
    • (2014) IEEE Cloud Computing Magazine , vol.1 , Issue.1 , pp. 94-96
    • Choo, K.-K.R.1
  • 12
    • 84911809780 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • retrieved August 1, 2014
    • Cloud Security Alliance. 2011. "Security Guidance for Critical Areas of Focus in Cloud Computing", CSA (available at https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf; retrieved August 1, 2014).
    • (2011) CSA
    • Cloud Security Alliance1
  • 13
    • 84963619798 scopus 로고    scopus 로고
    • The notorious nine cloud computing top threats in 2013
    • retrieved July 12, 2013
    • Cloud Security Alliance. 2013. "The Notorious Nine Cloud Computing Top Threats in 2013", CSA (available at http://www.cloudsecurityalliance.org/topthreats/; retrieved July 12, 2013).
    • (2013) CSA
    • Cloud Security Alliance1
  • 14
    • 0029004440 scopus 로고
    • Toward a theory of situation awareness in dynamic systems
    • Endsley, M. R. 1995. "Toward a Theory of Situation Awareness in Dynamic Systems", Human Factors (37:1), pp. 32-64.
    • (1995) Human Factors , vol.37 , Issue.1 , pp. 32-64
    • Endsley, M.R.1
  • 19
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Herath, T., and Rao, H. R. 2009. "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations", European Journal of Information Systems (18:2), pp. 106-125.
    • (2009) European Journal of Information Systems , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 20
    • 84875587046 scopus 로고    scopus 로고
    • Cloud computing and its implications for cybercrime investigations in Australia
    • Hooper, C., Martini, B., and Choo, K.-K. R. 2013. "Cloud computing and its implications for cybercrime investigations in Australia", Computer Law & Security Review (29:2), pp. 152-163.
    • (2013) Computer Law & Security Review , vol.29 , Issue.2 , pp. 152-163
    • Hooper, C.1    Martini, B.2    Choo, K.-K.R.3
  • 21
    • 84962209960 scopus 로고    scopus 로고
    • Exploratory factor analysis of user's compliance behaviour towards health information system's security
    • Humaidi, N., and Balakrishnan, V. 2013. "Exploratory Factor Analysis of User's Compliance Behaviour towards Health Information System's Security", Journal of Health & Medical Informatics (4:2), pp. 2-9.
    • (2013) Journal of Health & Medical Informatics , vol.4 , Issue.2 , pp. 2-9
    • Humaidi, N.1    Balakrishnan, V.2
  • 22
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    • Ifinedo, P. 2012. "Understanding Information Systems Security Policy Compliance: An integration of the Theory of Planned Behavior and The Protection Motivation Theory", Computers & Security (31:1), pp. 83-95.
    • (2012) Computers & Security , vol.31 , Issue.1 , pp. 83-95
    • Ifinedo, P.1
  • 23
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • Johnston, B. A. C., and Warkentin, M. 2010. "Fear Appeals and Information Security Behaviors: An Empirical Study", Management Information System (MIS) Quarterly (34:3), pp. 549-566.
    • (2010) Management Information System (MIS) Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, B.A.C.1    Warkentin, M.2
  • 27
    • 77955121478 scopus 로고    scopus 로고
    • Understanding security behaviors in personal computer usage: A threat avoidance perspective
    • Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective", Journal of the Association for Information System (11:7), pp. 394-413.
    • (2010) Journal of the Association for Information System , vol.11 , Issue.7 , pp. 394-413
    • Liang, H.1    Xue, Y.2
  • 29
    • 0000242433 scopus 로고
    • Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change
    • Maddux, J. E., and Rogers, R. W. 1983. "Protection Motivation and Self-Efficacy: A Revised Theory of Fear Appeals and Attitude Change", Journal of Experimental Social Psychology (19:5), pp. 469-479.
    • (1983) Journal of Experimental Social Psychology , vol.19 , Issue.5 , pp. 469-479
    • Maddux, J.E.1    Rogers, R.W.2
  • 30
    • 84940378505 scopus 로고    scopus 로고
    • Applying protection motivation theory to information security training for college student
    • Meso, P., Ding, Y., and Xu, S. 2013. "Applying Protection Motivation Theory to Information Security Training for College Student", Journal of Information Privacy and Security (9:1), pp. 47-67.
    • (2013) Journal of Information Privacy and Security , vol.9 , Issue.1 , pp. 47-67
    • Meso, P.1    Ding, Y.2    Xu, S.3
  • 31
    • 33746748784 scopus 로고    scopus 로고
    • On incident handling and response: A state-ofthe-art approach
    • Mitropoulos, S., Patsos, D., and Douligeris, C. 2006. "On Incident Handling and Response: A State-ofthe-Art Approach", Computers & Security (25:5), pp. 351-370.
    • (2006) Computers & Security , vol.25 , Issue.5 , pp. 351-370
    • Mitropoulos, S.1    Patsos, D.2    Douligeris, C.3
  • 34
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • Ng, B.-Y., Kankanhalli, A., and Xu, Y. 2009. "Studying Users' Computer Security Behavior: A Health Belief Perspective", Decision Support Systems (46:4), pp. 815-825.
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.3
  • 37
    • 0001840352 scopus 로고
    • A protection motivation theory of fear appeals and attitude change
    • Rogers, R. W. 1975. "A Protection Motivation Theory of Fear Appeals and Attitude Change", The Journal of Psychology: Interdisciplinary and Applied (91:1), pp. 93-114.
    • (1975) The Journal of Psychology: Interdisciplinary and Applied , vol.91 , Issue.1 , pp. 93-114
    • Rogers, R.W.1
  • 38
    • 84864546078 scopus 로고    scopus 로고
    • Organisational learning and incident response?: Promoting effective learning through the incident response process
    • Perth
    • Shedden, P., Ahmad, A., and Ruighaver, A. B. 2010. "Organisational Learning and Incident Response?: Promoting Effective Learning Through The Incident Response Process", in Australian Information Security Management Conference, Perth, pp. 131-142.
    • (2010) Australian Information Security Management Conference , pp. 131-142
    • Shedden, P.1    Ahmad, A.2    Ruighaver, A.B.3
  • 39
    • 84891789669 scopus 로고    scopus 로고
    • Employees' adherence to information security policies: An exploratory field study
    • Siponen, M., Adam Mahmood, M., and Pahnila, S. 2014. "Employees' Adherence to Information Security Policies: An Exploratory Field Study", Information and Management (51:2), pp. 217-224.
    • (2014) Information and Management , vol.51 , Issue.2 , pp. 217-224
    • Siponen, M.1    Adam Mahmood, M.2    Pahnila, S.3
  • 40
    • 84867677727 scopus 로고    scopus 로고
    • Designing a cyber attack information system for national situational awareness
    • Springer Berlin Heidelberg
    • Skopik, F., Ma, Z., Smith, P., and Bleier, T. 2012. "Designing a Cyber Attack Information System for National Situational Awareness", in Future Security (Vol. 318), Springer Berlin Heidelberg, pp. 277-288.
    • (2012) Future Security , vol.318 , pp. 277-288
    • Skopik, F.1    Ma, Z.2    Smith, P.3    Bleier, T.4
  • 41
    • 4043066977 scopus 로고
    • Situational Awareness Rating Technique (SART): The development of a tool for aircrew systems design
    • Taylor, R. M. 1990. "Situational Awareness Rating Technique (SART): The Development of a Tool for Aircrew Systems Design", Situational Awareness in Aerospace Operations (37:1), pp. 65-84.
    • (1990) Situational Awareness in Aerospace Operations , vol.37 , Issue.1 , pp. 65-84
    • Taylor, R.M.1
  • 42
    • 84861093724 scopus 로고    scopus 로고
    • Motivating IS security compliance: Insights from habit and protection motivation theory
    • Vance, A., Siponen, M., and Pahnila, S. 2012. "Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory", Information & Management (49:3), pp. 190-198.
    • (2012) Information & Management , vol.49 , Issue.3 , pp. 190-198
    • Vance, A.1    Siponen, M.2    Pahnila, S.3
  • 43
    • 82255162587 scopus 로고    scopus 로고
    • An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security
    • Wang, J., Xiao, N., and Rao, H. R. 2012. "An Exploration of Risk Information Search via a Search Engine: Queries and Clicks in Healthcare and Information Security", Decision Support Systems (52:2), pp. 395-405.
    • (2012) Decision Support Systems , vol.52 , Issue.2 , pp. 395-405
    • Wang, J.1    Xiao, N.2    Rao, H.R.3
  • 46
    • 84963524780 scopus 로고    scopus 로고
    • Implemention of cyber security situation awareness
    • W. Han, Z. Huang, C. Hu, H. Zhang, and L. Guo eds., Springer International Publishing
    • Zeng, J., Feng, X., Wang, D., and Fang, L. 2014. "Implemention of Cyber Security Situation Awareness", in Web Technologies and Applications W. Han, Z. Huang, C. Hu, H. Zhang, and L. Guo (eds.) (Vol. 2), Springer International Publishing, pp. 225-234.
    • (2014) Web Technologies and Applications , vol.2 , pp. 225-234
    • Zeng, J.1    Feng, X.2    Wang, D.3    Fang, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.