메뉴 건너뛰기




Volumn , Issue , 2019, Pages 253-270

Productive security: A scalable methodology for analysing employee security behaviours

Author keywords

[No Author keywords available]

Indexed keywords

SCALABILITY; SECURITY SYSTEMS; SURVEYS;

EID: 85075915934     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (33)
  • 2
    • 84967321284 scopus 로고    scopus 로고
    • Risk and morality: Three framing devices
    • J. Adams. Risk and morality: Three framing devices. Risk and morality:87-106, 2003.
    • (2003) Risk and Morality , pp. 87-106
    • Adams, J.1
  • 3
    • 34249871944 scopus 로고    scopus 로고
    • A qualitative study of users' view on information security
    • E. Albrechtsen. A qualitative study of users' view on information security. Computers & security, 26(4):276-289, 2007.
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 276-289
    • Albrechtsen, E.1
  • 4
    • 67649708310 scopus 로고    scopus 로고
    • The information security digital divide between information security managers and users
    • E. Albrechtsen and J. Hovden. The information security digital divide between information security managers and users. Computers & security, 28(6):476-490, 2009.
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 476-490
    • Albrechtsen, E.1    Hovden, J.2
  • 7
    • 85075913934 scopus 로고    scopus 로고
    • Combining qualitative coding and sentiment analysis: Deconstructing perceptions of usable security in organisations
    • IEEE, San Jose, California, US
    • I. Becker, S. Parkin and M. A. Sasse. Combining qualitative coding and sentiment analysis: deconstructing perceptions of usable security in organisations. In. Learning from Authoritative Security Experiment Results (LASER). IEEE, San Jose, California, US, 2016.
    • (2016) Learning from Authoritative Security Experiment Results (LASER)
    • Becker, I.1    Parkin, S.2    Sasse, M.A.3
  • 8
    • 85075947116 scopus 로고    scopus 로고
    • Employee rule breakers, excuse makers and security champions: Mapping the risk perceptions and emotions that drive security behaviors
    • Twente, Netherlands
    • O. Beris, A. Beautement and M. A. Sasse. Employee rule breakers, excuse makers and security champions: mapping the risk perceptions and emotions that drive security behaviors. In. NSPW. ACM, Twente, Netherlands, 2015.
    • (2015) NSPW. ACM
    • Beris, O.1    Beautement, A.2    Sasse, M.A.3
  • 9
    • 85075940742 scopus 로고    scopus 로고
    • Unpacking security policy compliance: The motivators and barriers of employees' security behaviors
    • USENIX Association, Ottawa
    • J. M. Blythe, L. Coventry and L. Little. Unpacking security policy compliance: the motivators and barriers of employees' security behaviors. In Symposium On Usable Privacy and Security (SOUPS). USENIX Association, Ottawa, 2015, pages 103-122.
    • (2015) Symposium on Usable Privacy and Security (SOUPS) , pp. 103-122
    • Blythe, J.M.1    Coventry, L.2    Little, L.3
  • 11
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • B. Bulgurcu, H. Cavusoglu and I. Benbasat. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3):523-548, 2010.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 13
    • 84926419890 scopus 로고    scopus 로고
    • Understanding employee responses to stressful information security requirements: A coping perspective
    • J. D'Arcy, T. Herath and M. K. Shoss. Understanding employee responses to stressful information security requirements: a coping perspective. Journal of management information systems, 31(2):285-318, 2014.
    • (2014) Journal of Management Information Systems , vol.31 , Issue.2 , pp. 285-318
    • D'Arcy, J.1    Herath, T.2    Shoss, M.K.3
  • 14
    • 23044525969 scopus 로고    scopus 로고
    • Current directions in is security research: Towards socio-organizational perspectives
    • G. Dhillon and J. Backhouse. Current directions in is security research: towards socio-organizational perspectives. Information systems journal, 11(2):127-153, 2001.
    • (2001) Information Systems Journal , vol.11 , Issue.2 , pp. 127-153
    • Dhillon, G.1    Backhouse, J.2
  • 15
    • 81255163048 scopus 로고    scopus 로고
    • Understanding nonmalicious security violations in the workplace: A composite behavior model
    • K. H. Guo, Y. Yuan, N. P. Archer and C. E. Connelly. Understanding nonmalicious security violations in the workplace: a composite behavior model. Journal of management information systems, 28(2):203-236, 2011.
    • (2011) Journal of Management Information Systems , vol.28 , Issue.2 , pp. 203-236
    • Guo, K.H.1    Yuan, Y.2    Archer, N.P.3    Connelly, C.E.4
  • 16
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • C. Herley. So long, and no thanks for the externalities: the rational rejection of security advice by users. In New Security Paradigms Workshop (NSPW), 2009, pages 133-144.
    • (2009) New Security Paradigms Workshop (NSPW) , pp. 133-144
    • Herley, C.1
  • 19
    • 84897916714 scopus 로고    scopus 로고
    • Determining employee awareness using the human aspects of information security questionnaire (HAIS-q)
    • K. Parsons, A. McCormac, M. Butavicius, M. Pattinson and C. Jerram. Determining employee awareness using the human aspects of information security questionnaire (HAIS-q). Computers & security, 42:165-176, 2014.
    • (2014) Computers & Security , vol.42 , pp. 165-176
    • Parsons, K.1    McCormac, A.2    Butavicius, M.3    Pattinson, M.4    Jerram, C.5
  • 21
    • 84925444851 scopus 로고    scopus 로고
    • From weakest link to security hero: Transforming staff security behavior
    • S. L. Pfleeger, M. A. Sasse and A. Furnham. From weakest link to security hero: transforming staff security behavior. Jhsem, 11(4):489-510, 2014.
    • (2014) Jhsem , vol.11 , Issue.4 , pp. 489-510
    • Pfleeger, S.L.1    Sasse, M.A.2    Furnham, A.3
  • 23
    • 84863482048 scopus 로고    scopus 로고
    • Blaming noncompliance is too convenient: What really causes information breaches?
    • K. Renaud. Blaming noncompliance is too convenient: what really causes information breaches? Security & privacy, IEEE, 10(3):57-63, 2012.
    • (2012) Security & Privacy, IEEE , vol.10 , Issue.3 , pp. 57-63
    • Renaud, K.1
  • 24
    • 84903744055 scopus 로고    scopus 로고
    • The curious incidence of security breaches by knowledgeable employees and the pivotal role a of security culture
    • Springer
    • K. Renaud and W. Goucher. The curious incidence of security breaches by knowledgeable employees and the pivotal role a of security culture. In, Human Aspects of Information Security, Privacy, and Trust, pages 361-372. Springer, 2014.
    • (2014) Human Aspects of Information Security, Privacy, and Trust , pp. 361-372
    • Renaud, K.1    Goucher, W.2
  • 25
    • 71949094501 scopus 로고    scopus 로고
    • Self-efficacy in information security: Its influence on end users' information security practice behavior
    • H.-S. Rhee, C. Kim and Y. U. Ryu. Self-efficacy in information security: its influence on end users' information security practice behavior. Computers & security, 28(8):816-826, 2009.
    • (2009) Computers & Security , vol.28 , Issue.8 , pp. 816-826
    • Rhee, H.-S.1    Kim, C.2    Ryu, Y.U.3
  • 28
    • 77957068563 scopus 로고    scopus 로고
    • Neutralization: New insights into the problem of employee information systems security policy violations
    • M. Siponen and A. Vance. Neutralization: new insights into the problem of employee information systems security policy violations. MIS quarterly, 34(3):487, 2010.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 487
    • Siponen, M.1    Vance, A.2
  • 31
    • 33744520370 scopus 로고    scopus 로고
    • Towards an information security competence maturity model
    • 2006
    • K.-L. Thomson and R. von Solms. Towards an information security competence maturity model. Computer fraud & security, 2006(5):11-15, 2006.
    • (2006) Computer Fraud & Security , Issue.5 , pp. 11-15
    • Thomson, K.-L.1    Von Solms, R.2
  • 32
    • 84930200251 scopus 로고    scopus 로고
    • Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
    • A. Tsohou, M. Karyda and S. Kokolakis. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs. Computers & security, 52:128-141, 2015.
    • (2015) Computers & Security , vol.52 , pp. 128-141
    • Tsohou, A.1    Karyda, M.2    Kokolakis, S.3
  • 33
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • M. Workman, W. H. Bommer and D. Straub. Security lapses and the omission of information security measures: a threat control model and empirical test. Computers in human behavior, 24(6):2799-2816, 2008.
    • (2008) Computers in Human Behavior , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.