메뉴 건너뛰기




Volumn 56, Issue 5, 2004, Pages 272-285

E-security issues and policy development in an information-sharing and networked environment

Author keywords

Criminals; Data security; Electronic commerce

Indexed keywords

COMPUTER CRIME; DATA PRIVACY; ELECTRONIC COMMERCE; INFORMATION DISSEMINATION; INFORMATION RETRIEVAL; INTERNET; SOCIETIES AND INSTITUTIONS;

EID: 9144224368     PISSN: 0001253X     EISSN: None     Source Type: Journal    
DOI: 10.1108/00012530410560878     Document Type: Review
Times cited : (7)

References (52)
  • 1
    • 0036758891 scopus 로고    scopus 로고
    • Raising a red flag on global WWW privacy policies
    • Arnett, K.P. and Liu, C. (2002), 'Raising a red flag on global WWW privacy policies", Journal of Computer Information Systems, Vol. 43 No. 1, pp. 117-28.
    • (2002) Journal of Computer Information Systems , vol.43 , Issue.1 , pp. 117-128
    • Arnett, K.P.1    Liu, C.2
  • 2
    • 0042827786 scopus 로고    scopus 로고
    • The malleability of undiscounted utilitarianism as a criterion of intergenerational justice
    • Ashein, G.B. and Buchholz, W. (2003), "The malleability of undiscounted utilitarianism as a criterion of intergenerational justice", Economica, Vol. 70 No. 279, pp. 405-23.
    • (2003) Economica , vol.70 , Issue.279 , pp. 405-423
    • Ashein, G.B.1    Buchholz, W.2
  • 5
    • 0032160264 scopus 로고    scopus 로고
    • The right mindset for managing information technology
    • Bensaou, M. and Earl, M. (1998), "The right mindset for managing information technology", Harvard Business Review, Vol. 76 No. 5, pp. 119-28.
    • (1998) Harvard Business Review , vol.76 , Issue.5 , pp. 119-128
    • Bensaou, M.1    Earl, M.2
  • 6
    • 0036780020 scopus 로고    scopus 로고
    • Selecting high-performing information technology professionals
    • Burke, L.A. and Witt, L.A. (2000), "Selecting high-performing information technology professionals", Journal of End User Computing, Vol. 14 No. 4, p. 37.
    • (2000) Journal of End User Computing , vol.14 , Issue.4 , pp. 37
    • Burke, L.A.1    Witt, L.A.2
  • 9
    • 1342298718 scopus 로고    scopus 로고
    • Security in a Web-based environment
    • Hopwood, W.S., Sinason, D. and Tucker, R. (2000), "Security in a Web-based environment". Managerial Finance, Vol. 26 No. 11, pp. 42-57.
    • (2000) Managerial Finance , vol.26 , Issue.11 , pp. 42-57
    • Hopwood, W.S.1    Sinason, D.2    Tucker, R.3
  • 10
    • 0036781732 scopus 로고    scopus 로고
    • An analysis of IS professional and end user causal attributions for user-system outcomes
    • Karsten, R. (2002), "An analysis of IS professional and end user causal attributions for user-system outcomes", Journal of End User Computing, Vol. 14 No. 4, pp. 51-73.
    • (2002) Journal of End User Computing , vol.14 , Issue.4 , pp. 51-73
    • Karsten, R.1
  • 11
    • 0007762907 scopus 로고    scopus 로고
    • The impact of information technology on the ethics of public sector management in the third millennium
    • Knyght, P.R., Korac-Kakabadse, A., Korac-Kakabadse, N. and Kouzmin, A. (2000), "The impact of information technology on the ethics of public sector management in the third millennium", Global Virtue Ethics Review, Vol. 2 No. 1, pp. 77-84.
    • (2000) Global Virtue Ethics Review , vol.2 , Issue.1 , pp. 77-84
    • Knyght, P.R.1    Korac-Kakabadse, A.2    Korac-Kakabadse, N.3    Kouzmin, A.4
  • 12
    • 3142521857 scopus 로고    scopus 로고
    • A critical look at the impact of cybercrime on consumer Internet behaviour
    • McGivern, E., Saban, K. and Saykiewiez, J.N. (2002), "A critical look at the impact of cybercrime on consumer Internet behaviour", Journal of Marketing Theory and Practice, Vol. 10 No. 2, pp. 29-37.
    • (2002) Journal of Marketing Theory and Practice , vol.10 , Issue.2 , pp. 29-37
    • McGivern, E.1    Saban, K.2    Saykiewiez, J.N.3
  • 13
    • 9144234440 scopus 로고    scopus 로고
    • Adoption of convention on cybercrime
    • Murphy, S.D. (2001), "Adoption of convention on cybercrime", The American Journal of International Law, Vol. 95 No. 4, pp. 889-91.
    • (2001) The American Journal of International Law , vol.95 , Issue.4 , pp. 889-891
    • Murphy, S.D.1
  • 14
    • 9144230355 scopus 로고    scopus 로고
    • How to profit by safeguarding privacy
    • Parker, R. (2003), "How to profit by safeguarding privacy", Journal of Accountancy, Vol. 195 No. 5, pp. 47-52.
    • (2003) Journal of Accountancy , vol.195 , Issue.5 , pp. 47-52
    • Parker, R.1
  • 15
    • 0000805916 scopus 로고
    • Toward the development of a multidimensional scale for improving evaluations of business ethics
    • Reidenbach, R. and Robin, D. (1990), "Toward the development of a multidimensional scale for improving evaluations of business ethics", Journal of Business Ethics, Vol. 9 No. 8, pp. 639-53.
    • (1990) Journal of Business Ethics , vol.9 , Issue.8 , pp. 639-653
    • Reidenbach, R.1    Robin, D.2
  • 16
    • 9144273527 scopus 로고    scopus 로고
    • Guarding the electronic gates
    • Roberts, M. (2002), "Guarding the electronic gates", Chemical Week, Vol. 20 No. 27, pp. 41-2.
    • (2002) Chemical Week , vol.20 , Issue.27 , pp. 41-42
    • Roberts, M.1
  • 17
    • 0348089527 scopus 로고    scopus 로고
    • Loyalty and e-marketing issues: Customer retention on the Web
    • Smith, A.D. (2002), "Loyalty and e-marketing issues: customer retention on the Web", Quarterly Journal of E-commerce, Vol. 3 No. 2, pp. 149-61.
    • (2002) Quarterly Journal of E-commerce , vol.3 , Issue.2 , pp. 149-161
    • Smith, A.D.1
  • 18
    • 9144242009 scopus 로고    scopus 로고
    • Surveying practicing project managers on curricular aspects of project management programs: A resource-based approach
    • Smith, A.D. (2003), "Surveying practicing project managers on curricular aspects of project management programs: a resource-based approach", Project Management Journal, Vol. 34 No. 2, pp. 26-33.
    • (2003) Project Management Journal , vol.34 , Issue.2 , pp. 26-33
    • Smith, A.D.1
  • 19
    • 2442488437 scopus 로고    scopus 로고
    • E-mail workplace privacy issues in an information- And knowledge-based environment
    • Smith, A.D. and Faley, R.A. (2001), "E-mail workplace privacy issues in an information- and knowledge-based environment", Southern Business Review, Vol. 27 No. 1, pp. 8-19.
    • (2001) Southern Business Review , vol.27 , Issue.1 , pp. 8-19
    • Smith, A.D.1    Faley, R.A.2
  • 20
    • 0036063961 scopus 로고    scopus 로고
    • Information management of automated data capture: An overview of technical developments
    • Smith, A.D. and Offodile, F. (2002), "Information management of automated data capture: an overview of technical developments", Information Management & Computer Security, Vol. 10 No. 3, pp. 109-18.
    • (2002) Information Management & Computer Security , vol.10 , Issue.3 , pp. 109-118
    • Smith, A.D.1    Offodile, F.2
  • 21
    • 0036063532 scopus 로고    scopus 로고
    • Application service providers (ASP): Moving downstream to enhance competitive advantage
    • Smith, A.D. and Rupp, W.T. (2002a), "Application service providers (ASP): moving downstream to enhance competitive advantage", Information Management & Computer Security, Vol. 10 No. 2, pp. 64-72.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2 , pp. 64-72
    • Smith, A.D.1    Rupp, W.T.2
  • 22
    • 0036036094 scopus 로고    scopus 로고
    • Issues in cybersecurity: Understanding the potential risks associated with hackers/crackers
    • Smith, A.D. and Rupp, W.T. (2002b), "Issues in cybersecurity: understanding the potential risks associated with hackers/crackers", Information Management & Computer Security, Vol. 10 No. 4, pp. 178-83.
    • (2002) Information Management & Computer Security , vol.10 , Issue.4 , pp. 178-183
    • Smith, A.D.1    Rupp, W.T.2
  • 23
    • 9144245866 scopus 로고    scopus 로고
    • Examination of the interrelationships between the Internet and religious organisations: An application of diffusion theory
    • Smith, A.D. and Rupp, W.T. (2002c), "Examination of the interrelationships between the Internet and religious organisations: an application of diffusion theory", Services Marketing Quarterly, Vol. 24 No. 2, pp. 29-41.
    • (2002) Services Marketing Quarterly , vol.24 , Issue.2 , pp. 29-41
    • Smith, A.D.1    Rupp, W.T.2
  • 24
    • 0028494782 scopus 로고
    • Information systems innovation among organizations
    • Swanson, E.B. (1994), "Information systems innovation among organizations", Management Science, Vol. 40 No. 9, pp. 1069-92.
    • (1994) Management Science , vol.40 , Issue.9 , pp. 1069-1092
    • Swanson, E.B.1
  • 25
    • 9144247281 scopus 로고    scopus 로고
    • E-risk is a manageable beast
    • Tuthill, M. (2001), "E-risk is a manageable beast", AFP Exchange, Vol. 21 No. 3, pp. 52-6.
    • (2001) AFP Exchange , vol.21 , Issue.3 , pp. 52-56
    • Tuthill, M.1
  • 26
    • 0000865987 scopus 로고
    • An applied ethical analysis system in business
    • Wong, A. and Beckman, E. (1992), "An applied ethical analysis system in business". Journal of Business Ethics, Vol. 11 No. 3, pp. 173-9.
    • (1992) Journal of Business Ethics , vol.11 , Issue.3 , pp. 173-179
    • Wong, A.1    Beckman, E.2
  • 27
    • 0036758891 scopus 로고    scopus 로고
    • Raising a red flag on global WWW privacy policies
    • Arnett, K.P. and Liu, C. (2002), "Raising a red flag on global WWW privacy policies", Journal of Computer Information Systems, Vol. 43 No. 1, pp. 117-28.
    • (2002) Journal of Computer Information Systems , vol.43 , Issue.1 , pp. 117-128
    • Arnett, K.P.1    Liu, C.2
  • 28
    • 0042827786 scopus 로고    scopus 로고
    • The malleability of undiscounted utilitarianism as a criterion of intergenerational justice
    • Ashein, G.B. and Buchholz, W. (2003), "The malleability of undiscounted utilitarianism as a criterion of intergenerational justice", Economica, Vol. 70 No. 279, pp. 405-23.
    • (2003) Economica , vol.70 , Issue.279 , pp. 405-423
    • Ashein, G.B.1    Buchholz, W.2
  • 31
    • 0032160264 scopus 로고    scopus 로고
    • The right mindset for managing information technology
    • Bensaou, M. and Earl, M. (1998), "The right mindset for managing information technology", Harvard Business Review, Vol. 76 No. 5, pp. 119-28.
    • (1998) Harvard Business Review , vol.76 , Issue.5 , pp. 119-128
    • Bensaou, M.1    Earl, M.2
  • 32
    • 0036780020 scopus 로고    scopus 로고
    • Selecting high-performing information technology professionals
    • Burke, L.A. and Witt, L.A. (2000), "Selecting high-performing information technology professionals", Journal of End User Computing, Vol. 14 No. 4, p. 37.
    • (2000) Journal of End User Computing , vol.14 , Issue.4 , pp. 37
    • Burke, L.A.1    Witt, L.A.2
  • 35
    • 1342298718 scopus 로고    scopus 로고
    • Security in a Web-based environment
    • Hopwood, W.S., Sinason, D. and Tucker, R. (2000), "Security in a Web-based environment", Managerial Finance, Vol. 26 No. 11, pp. 42-57.
    • (2000) Managerial Finance , vol.26 , Issue.11 , pp. 42-57
    • Hopwood, W.S.1    Sinason, D.2    Tucker, R.3
  • 36
    • 0036781732 scopus 로고    scopus 로고
    • An analysis of IS professional and end user causal attributions for user-system outcomes
    • Karsten, R. (2002), "An analysis of IS professional and end user causal attributions for user-system outcomes", Journal of End User Computing, Vol. 14 No. 4, pp. 51-73.
    • (2002) Journal of End User Computing , vol.14 , Issue.4 , pp. 51-73
    • Karsten, R.1
  • 37
    • 0007762907 scopus 로고    scopus 로고
    • The impact of information technology on the ethics of public sector management in the third millennium
    • Knyght, P.R., Korac-Kakabadse, A., Korac-Kakabadse, N. and Kouzmin, A. (2000), "The impact of information technology on the ethics of public sector management in the third millennium", Global Virtue Ethics Review, Vol. 2 No. 1, pp. 77-84.
    • (2000) Global Virtue Ethics Review , vol.2 , Issue.1 , pp. 77-84
    • Knyght, P.R.1    Korac-Kakabadse, A.2    Korac-Kakabadse, N.3    Kouzmin, A.4
  • 38
    • 3142521857 scopus 로고    scopus 로고
    • A critical look at the impact of cybercrime on consumer Internet behaviour
    • McGivern, E., Saban, K. and Saykiewiez, J.N. (2002), "A critical look at the impact of cybercrime on consumer Internet behaviour", Journal of Marketing Theory and Practice, Vol. 10 No. 2, pp. 29-37.
    • (2002) Journal of Marketing Theory and Practice , vol.10 , Issue.2 , pp. 29-37
    • McGivern, E.1    Saban, K.2    Saykiewiez, J.N.3
  • 39
    • 9144234440 scopus 로고    scopus 로고
    • Adoption of convention on cybercrime
    • Murphy, S.D. (2001), "Adoption of convention on cybercrime", The American Journal of International Law, Vol. 95 No. 4, pp. 889-91.
    • (2001) The American Journal of International Law , vol.95 , Issue.4 , pp. 889-891
    • Murphy, S.D.1
  • 40
    • 9144230355 scopus 로고    scopus 로고
    • How to profit by safeguarding privacy
    • Parker, R. (2003), "How to profit by safeguarding privacy", Journal of Accountancy, Vol. 195 No. 5, pp. 47-52.
    • (2003) Journal of Accountancy , vol.195 , Issue.5 , pp. 47-52
    • Parker, R.1
  • 41
    • 0000805916 scopus 로고
    • Toward the development of a multidimensional scale for improving evaluations of business ethics
    • Reidenbach, R. and Robin, D. (1990), "Toward the development of a multidimensional scale for improving evaluations of business ethics", Journal of Business Ethics, Vol. 9 No. 8, pp. 639-53.
    • (1990) Journal of Business Ethics , vol.9 , Issue.8 , pp. 639-653
    • Reidenbach, R.1    Robin, D.2
  • 42
    • 9144273527 scopus 로고    scopus 로고
    • Guarding the electronic gates
    • Roberts, M. (2002), "Guarding the electronic gates", Chemical Week, Vol. 20 No. 27, pp. 41-2.
    • (2002) Chemical Week , vol.20 , Issue.27 , pp. 41-42
    • Roberts, M.1
  • 43
    • 0348089527 scopus 로고    scopus 로고
    • Loyalty and e-marketing issues: Customer retention on the Web
    • Smith, A.D. (2002), "Loyalty and e-marketing issues: customer retention on the Web", Quarterly Journal of E-commerce, Vol. 3 No. 2, pp. 149-61.
    • (2002) Quarterly Journal of E-commerce , vol.3 , Issue.2 , pp. 149-161
    • Smith, A.D.1
  • 44
    • 9144242009 scopus 로고    scopus 로고
    • Surveying practicing project managers on curricular aspects of project management programs: A resource-based approach
    • Smith, A.D. (2003), "Surveying practicing project managers on curricular aspects of project management programs: a resource-based approach", Project Management Journal, Vol. 34 No. 2, pp. 26-33.
    • (2003) Project Management Journal , vol.34 , Issue.2 , pp. 26-33
    • Smith, A.D.1
  • 45
    • 2442488437 scopus 로고    scopus 로고
    • E-mail workplace privacy issues in an information- And knowledge-based environment
    • Smith, A.D. and Faley, R.A. (2001), "E-mail workplace privacy issues in an information- and knowledge-based environment", Southern Business Review, Vol. 27 No. 1, pp. 8-19.
    • (2001) Southern Business Review , vol.27 , Issue.1 , pp. 8-19
    • Smith, A.D.1    Faley, R.A.2
  • 46
    • 0036063961 scopus 로고    scopus 로고
    • Information management of automated data capture: An overview of technical developments
    • Smith, A.D. and Offodile, F. (2002), "Information management of automated data capture: an overview of technical developments", Information Management & Computer Security, Vol. 10 No. 3, pp. 109-18.
    • (2002) Information Management & Computer Security , vol.10 , Issue.3 , pp. 109-118
    • Smith, A.D.1    Offodile, F.2
  • 47
    • 0036063532 scopus 로고    scopus 로고
    • Application service providers (ASP): Moving downstream to enhance competitive advantage
    • Smith, A.D. and Rupp, W.T. (2002a), "Application service providers (ASP): moving downstream to enhance competitive advantage", Information Management & Computer Security, Vol. 10 No. 2, pp. 64-72.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2 , pp. 64-72
    • Smith, A.D.1    Rupp, W.T.2
  • 48
    • 0036036094 scopus 로고    scopus 로고
    • Issues in cybersecurity: Understanding the potential risks associated with hackers/ crackers
    • Smith, A.D. and Rupp, W.T. (2002b), "Issues in cybersecurity: understanding the potential risks associated with hackers/ crackers", Information Management & Computer Security, Vol. 10 No. 4, pp. 178-83.
    • (2002) Information Management & Computer Security , vol.10 , Issue.4 , pp. 178-183
    • Smith, A.D.1    Rupp, W.T.2
  • 49
    • 9144245866 scopus 로고    scopus 로고
    • Examination of the interrelationships between the Internet and religious organisations: An application of diffusion theory
    • Smith, A.D. and Rupp, W.T. (2002c), "Examination of the interrelationships between the Internet and religious organisations: an application of diffusion theory", Services Marketing Quarterly, Vol. 24 No. 2, pp. 29-41.
    • (2002) Services Marketing Quarterly , vol.24 , Issue.2 , pp. 29-41
    • Smith, A.D.1    Rupp, W.T.2
  • 50
    • 0028494782 scopus 로고
    • Information systems innovation among organizations
    • Swanson, E.B. (1994), "Information systems innovation among organizations", Management Science, Vol. 40 No. 9, pp. 1069-92.
    • (1994) Management Science , vol.40 , Issue.9 , pp. 1069-1092
    • Swanson, E.B.1
  • 51
    • 9144247281 scopus 로고    scopus 로고
    • E-risk is a manageable beast
    • Tuthill, M. (2001), "E-risk is a manageable beast", AFP Exchange, Vol. 21 No. 3, pp. 52-6.
    • (2001) AFP Exchange , vol.21 , Issue.3 , pp. 52-56
    • Tuthill, M.1
  • 52
    • 0000865987 scopus 로고
    • An applied ethical analysis system in business
    • Wong, A. and Beckman, E. (1992), "An applied ethical analysis system in business", Journal of Business Ethics, Vol. 11 No. 3, pp. 173-9.
    • (1992) Journal of Business Ethics , vol.11 , Issue.3 , pp. 173-179
    • Wong, A.1    Beckman, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.