메뉴 건너뛰기




Volumn 47, Issue , 2017, Pages 401-410

On the role of human morality in information system security

Author keywords

Ethics and information security; Information security management

Indexed keywords

INFORMATION SYSTEMS; INFORMATION USE; RELATIVITY; SECURITY OF DATA;

EID: 85066117816     PISSN: 18684238     EISSN: 1868422X     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (35)
  • 1
    • 84897776115 scopus 로고
    • The Second-Order Security Dilemma
    • W. Orlikowski, G. Walsham, M. Jones and J. DeGross (Eds.), London: Chapman & Hall
    • Baskerville, R., (1995), The Second-Order Security Dilemma. in W. Orlikowski, G. Walsham, M. Jones and J. DeGross (Eds.) Information Technology and Changes in Organizational Work. London: Chapman & Hall, pp. 239-249.
    • (1995) Information Technology and Changes in Organizational Work , pp. 239-249
    • Baskerville, R.1
  • 2
    • 0038356776 scopus 로고
    • Loompanics Unlimited, Port Townsend, Washington, USA
    • Fiery, D., (1994), Secrets of a Super Hacker. Loompanics Unlimited, Port Townsend, Washington, USA.
    • (1994) Secrets of a Super Hacker
    • Fiery, D.1
  • 3
    • 84921413114 scopus 로고
    • The 'Is/Ought' Problem resolved
    • Gewirth, A., (1974), The 'Is/Ought' Problem resolved. Proceedings and Addresses of the APA 47 (1973-74): 34-61.
    • (1974) Proceedings and Addresses of the APA , vol.47 , Issue.1973-74 , pp. 34-61
    • Gewirth, A.1
  • 4
    • 0003763221 scopus 로고
    • The University of Chicago Press, USA
    • Gewirth, A., (1978), Reason and Morality. The University of Chicago Press, USA.
    • (1978) Reason and Morality
    • Gewirth, A.1
  • 8
    • 52549104964 scopus 로고
    • Some Confusions about Subjectivity
    • (eds.): J. Bricke. Kansas University Press
    • Hare, R.M., (1976), Some Confusions about Subjectivity. In Freedom and Morality (eds.): J. Bricke. Kansas University Press.
    • (1976) Freedom and Morality
    • Hare, R.M.1
  • 10
    • 84935279966 scopus 로고
    • A Reductio ad Absurdum ofDescriptivism
    • edited by S. Shanker. Croom Helm, London, UK
    • Hare, R.M., (1986), A Reductio ad Absurdum ofDescriptivism. Philosophy in Britan Today. edited by S. Shanker. Croom Helm, London, UK.
    • (1986) Philosophy in Britan Today
    • Hare, R.M.1
  • 11
    • 84872863791 scopus 로고
    • Principles
    • R. M. Hare (eds.), Oxford University Press, UK
    • Hare, R.M., (1989), Principles. In R. M. Hare (eds.): Essays in Ethical Theory, pp. 48-65. Oxford University Press, UK.
    • (1989) Essays in Ethical Theory , pp. 48-65
    • Hare, R.M.1
  • 12
    • 85001596305 scopus 로고    scopus 로고
    • A Taxonomy of Ethical Theories
    • R.M. Hare, Oxford University Press, UK
    • Hare, (1997), A Taxonomy of Ethical Theories. In R.M. Hare (eds): Sorting out Ethics. Oxford University Press, UK.
    • (1997) Sorting out Ethics
    • Hare1
  • 13
    • 0000917858 scopus 로고    scopus 로고
    • The effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions
    • September
    • Harrington, S. J., (1996), The effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions. MIS Quartely, Vol. 20, No.3, September.
    • (1996) MIS Quartely , vol.20 , Issue.3
    • Harrington, S.J.1
  • 20
    • 70349727944 scopus 로고
    • What's wrong with relativism
    • Vol., No., pp
    • Niiniluoto, I., (1991), What's wrong with relativism. Science Studies, Vol. 4, No.2, pp. 17-24.
    • (1991) Science Studies , vol.4 , Issue.2 , pp. 17-24
    • Niiniluoto, I.1
  • 22
    • 85066125960 scopus 로고
    • Management Strategies for Computer Security
    • Boston, USA
    • Perry, W.E., (1985), Management Strategies for Computer Security. Butterworth Publisher, Boston, USA.
    • (1985) Butterworth Publisher
    • Perry, W.E.1
  • 27
    • 0001886189 scopus 로고
    • How to Derive "ought" from "Is
    • Searle, J., (1964), How to Derive "ought" from "Is". Ph. Rev., 73.
    • (1964) Ph. Rev. , pp. 73
    • Searle, J.1
  • 29
    • 0033683516 scopus 로고    scopus 로고
    • A Conceptual Foundation for Organizational Information Security Awareness
    • Volume, Issue, pp
    • Siponen, M.T., (2000a), A Conceptual Foundation for Organizational Information Security Awareness. Information Management & Computer Security. Volume 8, Issue 1, pp. 31-4 I.
    • (2000) Information Management & Computer Security , vol.8 , Issue.1 , pp. 31-34
    • Siponen, M.T.1
  • 31
    • 1242331240 scopus 로고
    • Deviancy by Bits and Bytes
    • J.H. Finch and E.G. Dougall (eds.): Proceedings of the Second IFIP International Conference on Computer Security (IFIP/Sec'84)
    • Straub, D. W., & Widom, C. P., (1984), Deviancy by Bits and Bytes. In Computer Security: A global challenge, J.H. Finch and E.G. Dougall (eds.): Proceedings of the Second IFIP International Conference on Computer Security (IFIP/Sec'84).
    • (1984) Computer Security: A Global Challenge
    • Straub, D.W.1    Widom, C.P.2
  • 32
    • 0000280419 scopus 로고
    • Effective IS Security: An empirical Study
    • June
    • Straub, D. W., (1990), Effective IS Security: An empirical Study. Information System Research. Vol. 1, Number 2, June, p. 255-277.
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 33
    • 0002699431 scopus 로고
    • Discovering and Disciplining Computer Abuse in Organization: A Field Study
    • March
    • Straub, D. W. & Nance, W. D., (1990), Discovering and Disciplining Computer Abuse in Organization: A Field Study. MIS Quartely. Vol. 14, No. 1, March.
    • (1990) MIS Quartely , vol.14 , Issue.1
    • Straub, D.W.1    Nance, W.D.2
  • 35
    • 0003785118 scopus 로고    scopus 로고
    • Second Edition. T J Press Ltd Padstow, Cornwall. UK
    • Warburton, N., (1996), Philosophy: the Basics. Second Edition. T J Press Ltd Padstow, Cornwall. UK.
    • (1996) Philosophy: The Basics
    • Warburton, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.