메뉴 건너뛰기




Volumn 17, Issue 5-6, 2008, Pages 207-227

Investigating information security awareness: Research and practice gaps

Author keywords

Information security awareness; Information security management

Indexed keywords


EID: 85016075946     PISSN: 19393555     EISSN: 19393547     Source Type: Journal    
DOI: 10.1080/19393550802492487     Document Type: Article
Times cited : (60)

References (58)
  • 1
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • Albrechtsen, E. (2007). A qualitative study of users' view on information security, Computers & Security, 26(4), pp. 276-289.
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 2
    • 78449271010 scopus 로고    scopus 로고
    • Security actions during reduction in workforce efforts: What to do when downsizing
    • Bray, T.J. (2002). Security actions during reduction in workforce efforts: What to do when downsizing, Information System Security, 11(1), pp. 11-15.
    • (2002) Information System Security , vol.11 , Issue.1 , pp. 11-15
    • Bray, T.J.1
  • 3
    • 33846367309 scopus 로고    scopus 로고
    • People—often the weakest link in security, but one of the best places to start
    • Bresz, F.P. (2004). People—often the weakest link in security, but one of the best places to start, Journal of Health Care Compliance, 6(4), pp. 57-60.
    • (2004) Journal of Health Care Compliance , vol.6 , Issue.4 , pp. 57-60
    • Bresz, F.P.1
  • 5
    • 60049085275 scopus 로고    scopus 로고
    • Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system
    • Chen, C.C., Shaw, R.S. and Yang, S.C. (2006). Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system, Information Technology Learning and Performance Journal, 24(1), pp. 1-14.
    • (2006) Information Technology Learning and Performance Journal , vol.24 , Issue.1 , pp. 1-14
    • Chen, C.C.1    Shaw, R.S.2    Yang, S.C.3
  • 9
    • 33748435812 scopus 로고    scopus 로고
    • Computer Security Institute. Retrieved May 28, 2008, from
    • CSI/FBI. (2006). Computer crime and security survey 2006. Computer Security Institute. Retrieved May 28, 2008, from http://i.cmpnet.com/ gocsi/db_area/pdfs/fbi/FBI2006.pdf
    • (2006) Computer Crime and Security Survey 2006.
  • 10
    • 33748435812 scopus 로고    scopus 로고
    • 2006. Computer Security Institute. Retrieved May 28, 2008, from
    • CSI/FBI. (2005). Computer crime and security survey. 2006. Computer Security Institute. Retrieved May 28, 2008, from http://i.cmpnet.com/ gocsi/db_area/pdfs/fbi/FBI2005.pdf
    • (2005) Computer Crime and Security Survey
  • 11
    • 37749015799 scopus 로고    scopus 로고
    • Improving end user behavior in password utilization: An action research initiative
    • Danuvasin, C., Murali, R. and Lorne, O. (2008). Improving end user behavior in password utilization: An action research initiative, Systemic Practice and Action Research, 21(1), pp. 55-72.
    • (2008) Systemic Practice and Action Research , vol.21 , Issue.1 , pp. 55-72
    • Danuvasin, C.1    Murali, R.2    Lorne, O.3
  • 13
    • 33846807812 scopus 로고    scopus 로고
    • Value-focused assessment of ict security awareness in an academic environment
    • Drevin, L., Kruger, H.A. and Steyn T. (2007). Value-focused assessment of ICT security awareness in an academic environment, Computers & Security, 26(1), pp. 36-43.
    • (2007) Computers & Security , vol.26 , Issue.1 , pp. 36-43
    • Drevin, L.1    Kruger, H.A.2    Steyn, T.3
  • 14
    • 49249116220 scopus 로고    scopus 로고
    • European Network and Information Security Agency. Retrieved June 9, 2008, from
    • ENISA. (2006). A users' guide: How to raise information security awareness 2006. European Network and Information Security Agency. Retrieved June 9, 2008, from http://www.enisa.europa.eu/doc/pdf/ deliverables/enisa_a_users_guide_how_to_raise_IS_awareness.pdf
    • (2006) A Users' Guide: How to Raise Information Security Awareness 2006.
  • 15
    • 84923430719 scopus 로고    scopus 로고
    • Retrieved June 9, 2008 from
    • Ernst & Young. (2005). Annual global information security survey 2005. Retrieved June 9, 2008 from www.vistorm.com/uplds/EY_Global_Information_ Security_survey_20051.pdf
    • (2005) Annual Global Information Security Survey 2005.
  • 16
    • 85025312367 scopus 로고    scopus 로고
    • Retrieved June 9, 2008 from
    • Ernst & Young. (2006). Annual global information security survey 2006. Retrieved June 9, 2008 from http://www.ey.com/Global/download. nsf/International/TSRS_-_GISS_2006/$file/EY_GISS2006.pdf
    • (2006) Annual Global Information Security Survey 2006
  • 17
    • 33644755338 scopus 로고    scopus 로고
    • Security awareness: Switch to a better program
    • Everett, C.J. (2006). Security awareness: Switch to a better program, Network Security, 2, pp. 15-18.
    • (2006) Network Security , vol.2 , pp. 15-18
    • Everett, C.J.1
  • 18
    • 84882779197 scopus 로고    scopus 로고
    • Network security policies and procedures
    • New York: Springer-Verlag.
    • Frye, D.W. (2007). Network security policies and procedures. In Series: Advances in Information Security. New York: Springer-Verlag.
    • (2007) In Series: Advances in Information Security
    • Frye, D.W.1
  • 19
  • 20
    • 33645589662 scopus 로고    scopus 로고
    • A prototype tool for information security awareness and training
    • Furnell, S.M., Gennatou, M. and Dowland, P.S. (2002). A prototype tool for information security awareness and training, Logistics Information Management, 15(5/6), pp. 352-357.
    • (2002) Logistics Information Management , vol.15 , Issue.5-6 , pp. 352-357
    • Furnell, S.M.1    Gennatou, M.2    Dowland, P.S.3
  • 21
    • 41749101976 scopus 로고    scopus 로고
    • Getting the most from training sessions: The art of raising security awareness without curing insomnia
    • Goucher, W. (2008). Getting the most from training sessions: the art of raising security awareness without curing insomnia, Computer Fraud & Security, (4), p. 15.
    • (2008) Computer Fraud & Security , vol.4 , pp. 15
    • Goucher, W.1
  • 22
    • 85003712015 scopus 로고    scopus 로고
    • Designing a security awareness program: Part i
    • Hansche, S. (2001a). Designing a security awareness program: Part I, Information Systems Security, 9(6), pp. 14-23.
    • (2001) Information Systems Security , vol.9 , Issue.6 , pp. 14-23
    • Hansche, S.1
  • 23
    • 33749351552 scopus 로고    scopus 로고
    • Information system security training: Making it happen: Part 2
    • Hansche, S. (2001b). Information system security training: Making it happen: Part 2, Information System Security, 10(3), pp. 51-70.
    • (2001) Information System Security , vol.10 , Issue.3 , pp. 51-70
    • Hansche, S.1
  • 26
    • 0034316957 scopus 로고    scopus 로고
    • Health care management and information systems security: Awareness, training or education?
    • Katsikas, S. (2000). Health care management and information systems security: Awareness, training or education? International Journal of Medical Informatics, 60(2), pp. 129-135.
    • (2000) International Journal of Medical Informatics , vol.60 , Issue.2 , pp. 129-135
    • Katsikas, S.1
  • 28
    • 49249103382 scopus 로고    scopus 로고
    • Doctoral dissertation, University of South Africa. Retrieved October 6, 2007, from
    • Kritzinger, E. (2006). An information security retrieval and awareness model for industry. Doctoral dissertation, University of South Africa. Retrieved October 6, 2007, from http://etd.unisa.ac.za/ETD-db/ ETD-desc/describe?urn = etd-11062006-094238
    • (2006) An Information Security Retrieval and Awareness Model for Industry.
    • Kritzinger, E.1
  • 29
    • 33746994612 scopus 로고    scopus 로고
    • A prototype for assessing information security awareness
    • Kruger, H.A. and Kearney, W.D. (2006). A prototype for assessing information security awareness, Computers & Security, 25(1), pp. 289-296.
    • (2006) Computers & Security , vol.25 , Issue.1 , pp. 289-296
    • Kruger, H.A.1    Kearney, W.D.2
  • 32
    • 45749094057 scopus 로고    scopus 로고
    • Master Thesis, NISlab Norwegian Information Security Laboratory, campus IT university. Retrieved October 6, 2007, from
    • Mathisen, J. (2004). Measuring information security awareness - A survey showing the Norwegian way to do it. Master Thesis, NISlab Norwegian Information Security Laboratory, campus IT university. Retrieved October 6, 2007, from http://dsv.su.se/en/seclab/pages/msckththeses-en
    • (2004) Measuring Information Security Awareness - a Survey Showing the Norwegian Way to Do It.
    • Mathisen, J.1
  • 34
    • 33745446307 scopus 로고    scopus 로고
    • M. Wilson (ed.), NIST Special Publication 800-50. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved October 6, 2007, from
    • NIST. (2003). Building an information technology security awareness and training program. In M. Wilson (ed.), NIST Special Publication 800-50. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved October 6, 2007, from http://csrc.nist.gov/publications/ nistpubs/
    • (2003) Building an Information Technology Security Awareness and Training Program
  • 35
    • 84905731710 scopus 로고    scopus 로고
    • Information technology security training requirements: A role- and performance-based model
    • M. Wilson (ed.), Gaithersburg, MD: National Institute of Standards and Technology. Retrieved October 6, 2007, from
    • NIST. (1998). Information technology security training requirements: A role- and performance-based model. In M. Wilson (ed.), NIST Special Publication 800-16. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved October 6, 2007, from http:// csrc.nist.gov/publications/nistpubs/
    • (1998) NIST Special Publication 800-16.
  • 36
  • 37
    • 84993099250 scopus 로고    scopus 로고
    • Implementing an information security awareness program
    • Peltier, T.R. (2005). Implementing an information security awareness program, Information Systems Security, 14(2), pp. 37-48.
    • (2005) Information Systems Security , vol.14 , Issue.2 , pp. 37-48
    • Peltier, T.R.1
  • 38
    • 37249038076 scopus 로고    scopus 로고
    • Developing a culture of privacy: A case study
    • Power, E.M. (2007). Developing a culture of privacy: A case study, IEEE Security and Privacy, 5(6), pp. 58-60.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.6 , pp. 58-60
    • Power, E.M.1
  • 39
    • 33744544943 scopus 로고    scopus 로고
    • Case study: A bold new approach to awareness and education, and how it met an ignoble fate
    • Power, R. and Forte, D. (2006). Case study: A bold new approach to awareness and education, and how it met an ignoble fate, Computer Fraud & Security, 2006(5), pp. 7-10.
    • (2006) Computer Fraud & Security , vol.2006 , Issue.5 , pp. 7-10
    • Power, R.1    Forte, D.2
  • 40
    • 49249131489 scopus 로고    scopus 로고
    • Doctoral Dissertation, Department of information processing science, University of Oulu. Retrieved October 6, 2007, from
    • Puhakainen, P. (2006). A design theory for information security awareness. Doctoral Dissertation, Department of information processing science, University of Oulu. Retrieved October 6, 2007, from http://herkules.oulu.fi/isbn9514281144/
    • (2006) A Design Theory for Information Security Awareness
    • Puhakainen, P.1
  • 41
    • 84858959401 scopus 로고    scopus 로고
    • Information security breaches survey - Technical report 2006. Retrieved October 6, 2007, from
    • PWHC. (2006). Pricewaterhouse Coopers. Information security breaches survey - Technical report 2006. Retrieved October 6, 2007, from http://www.pwc.com/Extweb/pwcpublications.nsf/docid/F9843CD3C8E0FB828025715A0058C63B
    • (2006) Pricewaterhouse Coopers.
  • 42
    • 78049393335 scopus 로고    scopus 로고
    • (
    • New York: Springer-Verlag
    • Qing, T., Ng, B. and Kankanhalli A. (2007). Individual's response to security messages: A decision-making perspective, decision support for global enterprises, In Series: Annals of Information Systems. New York: Springer-Verlag, pp. 177-191.
    • (2007) Series: Annals of Information Systems , pp. 177-191
    • Qing, T.1    Ng, B.2    Kankanhalli, A.3
  • 43
    • 77955673648 scopus 로고    scopus 로고
    • Information security culture - from analysis to change
    • Johannesburg, South Africa
    • Schlienger, T. and Teufel, S. (2003). Information security culture - from analysis to change. In Proceedings of ISSA 2003, Johannesburg, South Africa.
    • (2003) Proceedings of ISSA 2003
    • Schlienger, T.1    Teufel, S.2
  • 44
    • 84905725481 scopus 로고    scopus 로고
    • ITToolBox and Pentasafe, 2002. From Web Site:, [accessed at: 09-06-2008]
    • Security Awareness Index Report. (2002). The state of security awareness among organizations worldwide. ITToolBox and Pentasafe, 2002. From Web Site: http://security.ittoolbox.com/pub/AM101502a.pdf [accessed at: 09-06-2008].
    • (2002) The State of Security Awareness among Organizations Worldwide
  • 45
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Siponen, T. M. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8 (1), 31-41.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-41
    • Siponen, T.M.1
  • 51
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: Educating your users effectively
    • Thomson, M.E., & von Solms, R. (1998). Information security awareness: educating your users effectively. Information Management & Computer Security, 6(4), 167-173.
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    Von Solms, R.2
  • 52
    • 33745500491 scopus 로고    scopus 로고
    • Enhancing the employee security awareness model
    • Valentine, J.A. (2006). Enhancing the employee security awareness model. Computer Fraud & Security, 2006 (6), 17-19.
    • (2006) Computer Fraud & Security , vol.2006 , Issue.6 , pp. 17-19
    • Valentine, J.A.1
  • 53
    • 84870365725 scopus 로고    scopus 로고
    • Essential factors for successful software security awareness training
    • van Wyk, K.R., & Steven, J. (2006). Essential Factors for Successful Software Security Awareness Training. IEEE Security & Privacy,4 (5), 80-83.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.5 , pp. 80-83
    • Van Wyk, K.R.1    Steven, J.2
  • 54
    • 0033657872 scopus 로고    scopus 로고
    • Information security - the third wave?
    • von Solms, B. (2000). Information Security - The Third Wave?. Computers and Security, 19 (7), 615-620.
    • (2000) Computers and Security , vol.19 , Issue.7 , pp. 615-620
    • Von Solms, B.1
  • 56
    • 2342475711 scopus 로고    scopus 로고
    • Towards information security behavioural compliance
    • Vroom, C., & von Solms, R. (2004). Towards information security behavioural compliance. Computers & Security, 23(3), 191-198.
    • (2004) Computers & Security , vol.23 , Issue.3 , pp. 191-198
    • Vroom, C.1    Von Solms, R.2
  • 57
    • 0043219327 scopus 로고
    • Information security awareness raising methods
    • Wood, C. C. (1995). Information security awareness raising methods. Computer Fraud & Security Bulletin, 1995(6), 13-15.
    • (1995) Computer Fraud & Security Bulletin , vol.1995 , Issue.6 , pp. 13-15
    • Wood, C.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.