메뉴 건너뛰기




Volumn 8, Issue 5, 2000, Pages 197-209

Critical analysis of different approaches to minimizing user-related faults in information systems security: Implications for research and practice

Author keywords

Education; Information systems; Security

Indexed keywords

EDUCATION; FAILURE ANALYSIS; OPTIMIZATION; SECURITY OF DATA; SOFTWARE ENGINEERING;

EID: 8744290801     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220010353178     Document Type: Article
Times cited : (51)

References (76)
  • 4
    • 84986086702 scopus 로고    scopus 로고
    • Fear as a strategy: effects and impact within the organization
    • No
    • Appelbaum, S.H., Bregman, M and Moroz, P (1998), “Fear as a strategy: effects and impact within the organization”, Journal of European Industrial Training, Vol. 22 No 2, pp. 113-27
    • (1998) Journal of European Industrial Training , vol.22 , Issue.2 , pp. 113-127
    • Appelbaum, S.H.1    Bregman, M.2    Moroz, P.3
  • 6
    • 0004171316 scopus 로고
    • Second International ed., McGraw-Hill, New York, NY
    • Bartol, K.M. and Martin, D.C. (1994), Management, Second International ed., McGraw-Hill, New York, NY
    • (1994) Management
    • Bartol, K.M.1    Martin, D.C.2
  • 8
    • 0002082632 scopus 로고
    • The developmental duality of information systems security
    • Baskerville, R. (1992), “The developmental duality of information systems security”, Journal of Management Systems, Vol. 4 No. 1, pp. 1-12
    • (1992) Journal of Management Systems , vol.4 , Issue.1 , pp. 1-12
    • Baskerville, R.1
  • 11
    • 0031209960 scopus 로고    scopus 로고
    • The threat from the net [Internet security]
    • No
    • Bishop, M., Cheung, S. and Wee, C. (1997), “The threat from the net [Internet security]”, IEEE Spectrum, Vol. 34 No 8
    • (1997) IEEE Spectrum , vol.34 , Issue.8
    • Bishop, M.1    Cheung, S.2    Wee, C.3
  • 12
    • 84986021455 scopus 로고    scopus 로고
    • Crime, punishment and deterrence in Australia: a further empirical investigation
    • Boldman, P.M. and Maultby, C. (1997), “Crime, punishment and deterrence in Australia: a further empirical investigation”, Journal of Social Economics, Vol. 24, pp. 884-901
    • (1997) Journal of Social Economics , vol.24 , pp. 884-901
    • Boldman, P.M.1    Maultby, C.2
  • 13
    • 0002608856 scopus 로고
    • In search of the moral manager
    • March-April
    • Carrol, A.B. (1987), “In search of the moral manager”, Business Horizons, March-April, p. 8
    • (1987) Business Horizons , pp. 8
    • Carrol, A.B.1
  • 15
    • 0000130004 scopus 로고
    • Radical developments in accounting thought
    • Chua, W.F. (1986), “Radical developments in accounting thought”, Accounting Review, Vol. 61 No. 5, pp. 583-98
    • (1986) Accounting Review , vol.61 , Issue.5 , pp. 583-598
    • Chua, W.F.1
  • 16
    • 55249087535 scopus 로고
    • Perceived usefulness, perceived ease of use, and user acceptance of information technology
    • September
    • Davis, F. (1989), “Perceived usefulness, perceived ease of use, and user acceptance of information technology”, MIS Quarterly, Vol. 13 No. 3, September, pp. 319-40
    • (1989) MIS Quarterly , vol.13 , Issue.3 , pp. 319-340
    • Davis, F.1
  • 18
    • 33845225017 scopus 로고
    • The empirical exploration of intrinsic motivational processes
    • in, Berkowitz, L (Ed.), Academic Press
    • Deci, E.L. and Ryan, R.M. (1980), “The empirical exploration of intrinsic motivational processes”, in Berkowitz, L (Ed.), Advances in Experimental Social Psychology, Academic Press, Vol. 13, pp. 39-80
    • (1980) Advances in Experimental Social Psychology , vol.13 , pp. 39-80
    • Deci, E.L.1    Ryan, R.M.2
  • 20
    • 8744307609 scopus 로고
    • Integrating OB MOD with cognitive approaches to motivation
    • Fedor, D.B. and Ferris, G.R. (1981), “Integrating OB MOD with cognitive approaches to motivation”, Academy of Management Review, Vol. 6 No. 1, pp. 115-25
    • (1981) Academy of Management Review , vol.6 , Issue.1 , pp. 115-125
    • Fedor, D.B.1    Ferris, G.R.2
  • 22
    • 84986713580 scopus 로고
    • Asymmetrical effects of rewards and punishment: the case of social loafing
    • George, J.M. (1995), “Asymmetrical effects of rewards and punishment: the case of social loafing”, Journal of Occupational & Organizational Psychology, Vol. 68 No. 4, pp. 327-440
    • (1995) Journal of Occupational & Organizational Psychology , vol.68 , Issue.4 , pp. 327-440
    • George, J.M.1
  • 24
    • 0000917858 scopus 로고    scopus 로고
    • The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions
    • September
    • Harrington, S.J. (1996), “The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions”, MIS Quarterly, Vol. 20 No. 3, September
    • (1996) MIS Quarterly , vol.20 , Issue.3
    • Harrington, S.J.1
  • 25
    • 0001214077 scopus 로고
    • A paradigmatic analysis of contemporary schools of IS development
    • Iivari, J. (1991), “A paradigmatic analysis of contemporary schools of IS development”, European Journal of Information Systems, Vol. 1 No. 4, pp. 249-72
    • (1991) European Journal of Information Systems , vol.1 , Issue.4 , pp. 249-272
    • Iivari, J.1
  • 26
    • 0030286609 scopus 로고    scopus 로고
    • Analyzing information systems development: a comparison and analysis of eight IS development approaches
    • Iivari, J. and Hirschheim, R. (1996), “Analyzing information systems development: a comparison and analysis of eight IS development approaches”, Information Systems, Vol. 21 No. 7, pp. 551-75
    • (1996) Information Systems , vol.21 , Issue.7 , pp. 551-575
    • Iivari, J.1    Hirschheim, R.2
  • 27
    • 0002165187 scopus 로고
    • A sociocybernetic framework for the feature analysis of information systems design methodologies
    • in, Olle, T.W., Sol, H.G.,. and, Tully, C.J.,. (Eds), North-Holland, Amsterdam
    • Iivari, J. and Kerola, P. (1983), “A sociocybernetic framework for the feature analysis of information systems design methodologies”, in Olle, T.W., Sol, H.G. and Tully, C.J. (Eds), Information Systems Design Methodologies: A Feature Analysis, North-Holland, Amsterdam, pp. 87-139
    • (1983) Information Systems Design Methodologies: A Feature Analysis , pp. 87-139
    • Iivari, J.1    Kerola, P.2
  • 28
    • 0032334755 scopus 로고    scopus 로고
    • A paradigmatic analysis of contrasting information systems development approaches and methodologies
    • Iivari, J, Hirschheim, R and Klein, H.K., (1998), “A paradigmatic analysis of contrasting information systems development approaches and methodologies”, Information Systems Research, Vol. 9 No. 2, pp. 164-93
    • (1998) Information Systems Research , vol.9 , Issue.2 , pp. 164-193
    • Iivari, J.1    Hirschheim, R.2    Klein, H.K.3
  • 29
    • 0011648740 scopus 로고    scopus 로고
    • The new classification of research approaches
    • Zemanek, H (Ed.), IFIP, Laxenburg
    • Järvinen, P. (1997), “The new classification of research approaches”, in Zemanek, H (Ed.), The IFIP Pink Summary – 36 Years of IFIP, IFIP, Laxenburg
    • (1997) The IFIP Pink Summary – 36 Years of IFIP
    • Järvinen, P.1
  • 37
    • 6744260746 scopus 로고
    • Information security awareness – selling the cause
    • Singapore, 27-29 May
    • McLean, K. (1992), “Information security awareness – selling the cause”, Proceedings of the IFIP TC11 /Sec'92, Singapore, 27-29 May
    • (1992) Proceedings of the IFIP TC11 /Sec'92
    • McLean, K.1
  • 39
    • 73549114871 scopus 로고
    • Predicting user intentions: comparing the technology acceptance model with the theory of planned behaviour
    • Mathieson, K. (1991), “Predicting user intentions: comparing the technology acceptance model with the theory of planned behaviour”, Information Systems Research, Vol. 3 No. 2, pp. 173-91
    • (1991) Information Systems Research , vol.3 , Issue.2 , pp. 173-191
    • Mathieson, K.1
  • 40
    • 0018543411 scopus 로고
    • Password security: a case history
    • Morris, R. and Thompson, K. (1979), “Password security: a case history”, Communication of the ACM, Vol. 22 No. 11, pp. 594-7
    • (1979) Communication of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 42
    • 85001840137 scopus 로고    scopus 로고
    • Inside risks: risks of insiders
    • Issue
    • Neumann, P.G. (1999), “Inside risks: risks of insiders”, Communication of the ACM, Vol. 42 Issue 12, p. 160
    • (1999) Communication of the ACM , vol.42 , Issue.12 , pp. 160
    • Neumann, P.G.1
  • 43
    • 8744247022 scopus 로고
    • Science and epistemic values
    • Niiniluoto, I. (1990), “Science and epistemic values”, Science Studies, Vol. 3 No. 1, pp. 21-5
    • (1990) Science Studies , vol.3 , Issue.1 , pp. 21-25
    • Niiniluoto, I.1
  • 45
    • 0038562418 scopus 로고
    • The NIST Handbook, 1995, NIST special publications, October
    • NIST (1995), The NIST Handbook, (1995), An Introduction to Computer Security, NIST special publications, October
    • (1995) An Introduction to Computer Security
  • 50
    • 0020391832 scopus 로고
    • Effects of leader contingent and noncontingent rewards and punishment behaviours on subordinate performance and satisfaction
    • Podsakoff, P.M., Todor, W.D. and Skov, R. (1982), “Effects of leader contingent and noncontingent rewards and punishment behaviours on subordinate performance and satisfaction”, Academy of Management Journal, Vol. 25 No. 4, pp. 810-21
    • (1982) Academy of Management Journal , vol.25 , Issue.4 , pp. 810-821
    • Podsakoff, P.M.1    Todor, W.D.2    Skov, R.3
  • 55
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Saltzer, J.H. and Schroeder, M.D. (1975), “The protection of information in computer systems”, Proceedings of the IEEE, Vol. 63 No. 1, September
    • (1975) Proceedings of the IEEE , vol.63 , Issue.1
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 56
    • 33748733372 scopus 로고
    • Integrity mechanism in database management systems
    • in, Abrams, M.D., Jajodia, S and Podell, H.J.,. (Eds), IEEE Computer Society Press, Los Alamitos, CA
    • Sandhu, R. and Jajodia, S. (1995), “Integrity mechanism in database management systems”, in Abrams, M.D., Jajodia, S and Podell, H.J. (Eds), Information Security – An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA
    • (1995) Information Security – An Integrated Collection of Essays
    • Sandhu, R.1    Jajodia, S.2
  • 58
    • 0000486706 scopus 로고
    • Further thoughts on punishment in organizations
    • Sims, H.P. (1980), “Further thoughts on punishment in organizations”, Academy of Management Review, Vol. 5 No. 1, pp. 133-8
    • (1980) Academy of Management Review , vol.5 , Issue.1 , pp. 133-138
    • Sims, H.P.1
  • 60
    • 0033683516 scopus 로고    scopus 로고
    • A conceptual foundation for organizational information security awareness
    • Issue
    • Siponen, M.T. (2000a), “A conceptual foundation for organizational information security awareness”, Information Management & Computer Security, Vol. 8 Issue 1
    • (2000) Information Management & Computer Security , vol.8 , Issue.1
    • Siponen, M.T.1
  • 61
    • 84986153153 scopus 로고    scopus 로고
    • “On the role of human morality in information system security: the problems of descriptivism and non-descriptive foundations”, Beijing
    • Siponen, M.T. (2000b), “On the role of human morality in information system security: the problems of descriptivism and non-descriptive foundations”, 15th International Information Security Conference (IFIP TC11/SEC2000), Beijing
    • (2000) 15th International Information Security Conference (IFIP TC11/SEC2000)
    • Siponen, M.T.1
  • 62
    • 0011644488 scopus 로고    scopus 로고
    • An analysis of the recent IS security development approaches: descriptive and prescriptive implications
    • Dhillon, G. (Ed.), Idea Group
    • Siponen, M.T. (2000c), “An analysis of the recent IS security development approaches: descriptive and prescriptive implications”, in Dhillon, G. (Ed.), Information Security Management – Global Challenges in the Next Millennium, Idea Group
    • (2000) Information Security Management – Global Challenges in the Next Millennium
    • Siponen, M.T.1
  • 64
    • 8744260415 scopus 로고    scopus 로고
    • Competing against human failing
    • The Global Information Society on the Way to the Next Millennium, SEC, TC11, Vienna
    • Spruit, M.E.M. (1998), “Competing against human failing”, 15th IFIP World Computer Congress, “The Global Information Society on the Way to the Next Millennium”, SEC, TC11, Vienna
    • (1998) 15th IFIP World Computer Congress
    • Spruit, M.E.M.1
  • 65
    • 0242453511 scopus 로고
    • Promoting security awareness and commitment
    • Spurling, P. (1995), “Promoting security awareness and commitment”, Information Management and Computer Security, Vol. 3 No. 2, pp. 20-6
    • (1995) Information Management and Computer Security , vol.3 , Issue.2 , pp. 20-26
    • Spurling, P.1
  • 66
    • 8744241162 scopus 로고
    • Deterring highly motivated computer abuses: a field experiment in computer security
    • in, Gable, G.G.,. and, Caelli, W.J.,. (Eds), North Holland, Amsterdam
    • Straub, D., Carson, P. and Jones, E. (1992), “Deterring highly motivated computer abuses: a field experiment in computer security”, in Gable, G.G. and Caelli, W.J. (Eds), IT Security: The Need for International Cooperation, North Holland, Amsterdam, pp. 309-24
    • (1992) IT Security: The Need for International Cooperation , pp. 309-324
    • Straub, D.1    Carson, P.2    Jones, E.3
  • 67
    • 0000280419 scopus 로고
    • Effective IS security: an empirical study
    • June
    • Straub, D.W. (1990), “Effective IS security: an empirical study”, Information System Research, Vol. 1 No. 2, June, p. 255-77
    • (1990) Information System Research , vol.1 , Issue.2 , pp. 255-277
    • Straub, D.W.1
  • 68
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: security planning models for management decision making
    • Straub, D.W. and Welke, R.J. (1998), “Coping with systems risk: security planning models for management decision making”, MIS Quarterly, Vol. 22 No. 4, p. 441-64
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-464
    • Straub, D.W.1    Welke, R.J.2
  • 69
    • 1242331240 scopus 로고
    • Deviancy by bits and bytes
    • in, Finch, J.H.,. and, Dougall, E.G (Eds), Elsevier Science Publisher, Barking
    • Straub, D.W. and Widom, C.P. (1984), Deviancy by bits and bytes”, in Finch, J.H. and Dougall, E.G (Eds), Computer Security: A Global Challenge, Elsevier Science Publisher, Barking
    • (1984) Computer Security: A Global Challenge
    • Straub, D.W.1    Widom, C.P.2
  • 71
    • 0242517401 scopus 로고    scopus 로고
    • Information security awareness: educating our users effectively
    • Thomson, M.E. and von Solms, R., (1998), “Information security awareness: educating our users effectively”, Information Management & Computer Security, Vol. 6 No. 4, pp. 167-73
    • (1998) Information Management & Computer Security , vol.6 , Issue.4 , pp. 167-173
    • Thomson, M.E.1    von Solms, R.2
  • 74
    • 0030554013 scopus 로고    scopus 로고
    • Misbehavior in organizations: a motivational framework
    • March-April
    • Vardi, Y. and Wiener, Y. (1996), “Misbehavior in organizations: a motivational framework”, Organization Science, Vol. 7 No. 2, March-April, pp. 151-65
    • (1996) Organization Science , vol.7 , Issue.2 , pp. 151-165
    • Vardi, Y.1    Wiener, Y.2
  • 75
  • 76
    • 84926001904 scopus 로고    scopus 로고
    • User-Centered Security
    • ACM New Security, 17-20 September, Lake Arrowhead, CA
    • Zurko, M.E. and Simon, R.T. (1996), “User-Centered Security’, ACM New Security Paradigms Workshop, 17-20 September, Lake Arrowhead, CA
    • (1996) Paradigms Workshop
    • Zurko, M.E.1    Simon, R.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.