메뉴 건너뛰기




Volumn , Issue , 2015, Pages 262-280

BEHAVIORAL INFORMATION SECURITY: An Overview, Results, and Research Agenda

Author keywords

Information Security; Organizational Psychology; Surveys

Indexed keywords


EID: 85139599019     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4324/9781315703619-22     Document Type: Chapter
Times cited : (11)

References (52)
  • 1
    • 84986665106 scopus 로고
    • The measurement and antecedents of affective, continuance, and normative commitment to the organization
    • Allen, N.J., and Meyer, J.P. The measurement and antecedents of affective, continuance, and normative commitment to the organization. Journal of Occupational Psychology, 63 (1990), 1-18.
    • (1990) Journal of Occupational Psychology , vol.63 , pp. 1-18
    • Allen, N.J.1    Meyer, J.P.2
  • 3
    • 0029697680 scopus 로고    scopus 로고
    • Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8
    • Anderson, R. A Security Policy Model for Clinical Information Systems. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 6-8, 1996, pp. 30-43.
    • (1996) A Security Policy Model for Clinical Information Systems , pp. 30-43
    • Anderson, R.1
  • 5
    • 0024669859 scopus 로고
    • Effect of perceived controllability and performance standards on self-regulation of complex decision making
    • Bandura, A., and Wood, R. Effect of perceived controllability and performance standards on self-regulation of complex decision making. Journal of Personality and Social Psychology, 56 (1989), 805-814.
    • (1989) Journal of Personality and Social Psychology , vol.56 , pp. 805-814
    • Bandura, A.1    Wood, R.2
  • 7
    • 18144412521 scopus 로고    scopus 로고
    • Unpublished manuscript. Canberra, Australia: Australian National University
    • Clarke, R. Introduction to Information Security. Unpublished manuscript. Canberra, Australia: Australian National University, 2001 (available at http://www.anu.edu.au/people/Roger.Clarke/EC/IntroSecy.html).
    • (2001) Introduction to Information Security
    • Clarke, R.1
  • 8
    • 11944272254 scopus 로고
    • A power primer
    • Cohen, J. A power primer. Psychological Bulletin, 112, 1 (1992), 155-159.
    • (1992) Psychological Bulletin , vol.112 , Issue.1 , pp. 155-159
    • Cohen, J.1
  • 9
    • 0036398120 scopus 로고    scopus 로고
    • Policy enforcement in the workplace
    • David, J. Policy enforcement in the workplace. Computers and Security, 21, 6 (2002), 506-513.
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 506-513
    • David, J.1
  • 11
    • 33744996371 scopus 로고    scopus 로고
    • London: Presentation Services
    • Ernst and Young LLP. Global Information Security Survey. London: Presentation Services, 2002.
    • (2002) Global Information Security Survey
  • 12
    • 0041482709 scopus 로고    scopus 로고
    • Working Paper: University of Kansas
    • Ettredge, M., and Richardson, V.J. Assessing the risk in e-commerce. Working Paper: University of Kansas, 2001 (available at: http://dlib2.computer.org/conferen/hicss/1435/pdf/14350194.pdf).
    • (2001) Assessing the risk in e-commerce
    • Ettredge, M.1    Richardson, V.J.2
  • 13
  • 16
    • 7744225382 scopus 로고    scopus 로고
    • Top 10 security mistakes
    • Horowitz, A. Top 10 security mistakes. Computerworld, 35, 28, (2001).
    • (2001) Computerworld , vol.35 , pp. 28
    • Horowitz, A.1
  • 17
    • 85139702606 scopus 로고    scopus 로고
    • People are the weak links in IT security
    • April 16
    • Hull, S. People are the weak links in IT security. The Argus, April 16, 2002.
    • (2002) The Argus
    • Hull, S.1
  • 20
    • 0029545652 scopus 로고
    • A new model for information security policies
    • Lindup, K.R. A new model for information security policies. Computer and Security, 14, 8 (1995), 691-695.
    • (1995) Computer and Security , vol.14 , Issue.8 , pp. 691-695
    • Lindup, K.R.1
  • 21
    • 0030194196 scopus 로고    scopus 로고
    • Evaluating ethical decision-making and computer use
    • Loch, K.D., and Conger, S. (1996). Evaluating ethical decision-making and computer use. Communications of the ACM, 39 (7), 74-83.
    • (1996) Communications of the ACM , vol.39 , Issue.7 , pp. 74-83
    • Loch, K.D.1    Conger, S.2
  • 22
    • 0036000504 scopus 로고    scopus 로고
    • Building an integrative model of extra role work behaviors: A comparison of counterproductive work behavior with organizational citizenship behavior
    • Miles, D.E.; Borman, W.E.; Spector, P.E.; and Fox, S. Building an integrative model of extra role work behaviors: a comparison of counterproductive work behavior with organizational citizenship behavior. International Journal of Selection and Assessment, 10 (2002), 51-57.
    • (2002) International Journal of Selection and Assessment , vol.10 , pp. 51-57
    • Miles, D.E.1    Borman, W.E.2    Spector, P.E.3    Fox, S.4
  • 25
    • 0242666477 scopus 로고
    • Attention and vigilance in human-computer interaction
    • A. Gale and B. Christie, London: Wiley
    • Parasuraman, R., and Bowers, J.C. Attention and vigilance in human-computer interaction. In A. Gale and B. Christie (eds.), Psychophysiology of the Electronic Workplace. London: Wiley, 1987, pp. 163-194.
    • (1987) Psychophysiology of the Electronic Workplace , pp. 163-194
    • Parasuraman, R.1    Bowers, J.C.2
  • 28
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L.; Shamir, A.; Adleman, L.A. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 2 (1978), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.A.3
  • 30
    • 85139648600 scopus 로고    scopus 로고
    • The weakest link
    • Scanlon, B. The weakest link. ZDNet Australia News and Technology, 2002 (available at: http://www.zdnet.com.au/newstech/security/story/0, 2000024985, 20241014-5, 00.htm).
    • (2002) ZDNet Australia News and Technology
    • Scanlon, B.1
  • 33
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E.E. A framework for understanding and predicting insider attacks. Computers and Security, 21, 6 (2002), 526-531.
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 35
    • 84955605432 scopus 로고    scopus 로고
    • Learning temporal regularities of user behavior for anomaly detection
    • V.I. Gorodetski, V.A. Skormin, and L.J. Popyack, St. Petersburg, Russia: International Workshop MMM-ACNS
    • Seleznyov, A.; Mazhelis, O.; and Puuronen, S. Learning temporal regularities of user behavior for anomaly detection. In V.I. Gorodetski, V.A. Skormin, and L.J. Popyack (eds.), Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security. St. Petersburg, Russia: International Workshop MMM-ACNS, 2001, pp. 143-152.
    • (2001) Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security , pp. 143-152
    • Seleznyov, A.1    Mazhelis, O.2    Puuronen, S.3
  • 37
    • 47149111699 scopus 로고    scopus 로고
    • Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
    • V.I. Gorodetski, V.A. Skormin, and L.J. Popyack, St. Petersburg, Russia: International Workshop MMM-ACNS
    • Singh, H.; Furnell, S.; Lines, B.; and Dowland, P. Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. In V.I. Gorodetski, V.A. Skormin, and L.J. Popyack (eds.), Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security. St. Petersburg, Russia: International Workshop MMM-ACNS, 2001, pp. 153-158.
    • (2001) Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security , pp. 153-158
    • Singh, H.1    Furnell, S.2    Lines, B.3    Dowland, P.4
  • 38
    • 85001555189 scopus 로고    scopus 로고
    • On the role of human morality in information systems security
    • Siponen, M.T. On the role of human morality in information systems security. Information Resources Management Journal, 14, 4 (2001), 15-23.
    • (2001) Information Resources Management Journal , vol.14 , Issue.4 , pp. 15-23
    • Siponen, M.T.1
  • 40
    • 0242537133 scopus 로고    scopus 로고
    • Company profile of the frequent internet user: Web addict or happy employee?
    • Stanton, J.M. Company profile of the frequent internet user: web addict or happy employee? Communications of the Association for Computing Machinery, 45, 1 (2002), 55-59.
    • (2002) Communications of the Association for Computing Machinery , vol.45 , Issue.1 , pp. 55-59
    • Stanton, J.M.1
  • 41
    • 0000280419 scopus 로고
    • Effective IS security: An empirical study
    • Straub, D.W. Effective IS security: an empirical study. Information Systems Research, 1, 2 (1990), 255-277.
    • (1990) Information Systems Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 42
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • Straub, D.W., and Welke, R.J. Coping with systems risk: security planning models for management decision making. MIS Quarterly, 22, 4 (1998), 441-464.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 43
  • 44
    • 0034926180 scopus 로고    scopus 로고
    • A framework for the implementation of socio-ethical controls in information security
    • Trompeter, C.M., and Eloff, J.H.P. A framework for the implementation of socio-ethical controls in information security. Computers and Security, 20 (2001), 384-391.
    • (2001) Computers and Security , vol.20 , pp. 384-391
    • Trompeter, C.M.1    Eloff, J.H.P.2
  • 46
    • 0039639238 scopus 로고
    • Organizational computer security policy: The reality
    • Warman, A.R. Organizational computer security policy: the reality. European Journal of Information Systems, 1, 5 (1992), 305-310.
    • (1992) European Journal of Information Systems , vol.1 , Issue.5 , pp. 305-310
    • Warman, A.R.1
  • 49
    • 0000613590 scopus 로고
    • Writing infosec policies
    • Wood, C.C. Writing infosec policies. Computer and Security, 14, 8 (1995), 667-674.
    • (1995) Computer and Security , vol.14 , Issue.8 , pp. 667-674
    • Wood, C.C.1
  • 52
    • 78651413507 scopus 로고    scopus 로고
    • User profiling for intrusion detection using dynamic and static behavioral models
    • M.-S. Cheng, P.S. Yu, and B. Liu, PAKDD 2002, Taipei, Taiwan, May 6-8, 2002. 2002, Proceedings
    • Yeung, D.-Y., and Ding, Y. (2002). User profiling for intrusion detection using dynamic and static behavioral models. In M.-S. Cheng, P.S. Yu, and B. Liu (eds.), Advances in Knowledge Discovery and Data Mining 6th Pacific-Asia Conference, PAKDD 2002, Taipei, Taiwan, May 6-8, 2002. Proceedings, 2002, pp. 494-505.
    • (2002) Advances in Knowledge Discovery and Data Mining 6th Pacific-Asia Conference , pp. 494-505
    • Yeung, D.-Y.1    Ding, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.