정보보안대책과 정보시스템 오남용과의 인과적 관계

논문상세정보
' 정보보안대책과 정보시스템 오남용과의 인과적 관계' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 경영관리
  • generaldeterrencetheory
  • ismisuse
  • issecuritycountermeasures
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
9,238 0

0.0%

' 정보보안대책과 정보시스템 오남용과의 인과적 관계' 의 참고문헌

  • 학내 정보보호수립에 관한 연구
    유기훈 한국IT서비스학회지 7 (3) : 23 ~ 43 [2008]
  • 컴퓨터 오남용의 의도와 행동을 결정하는 조직 및 개인적 특성
    장활식 정보화정책 20 (1) : 42 ~ 60 [2013]
  • 정보보안의식이 패스워드 보안행동에 미치는 영향에 관한 연구
    하상원 디지털컨텐츠학회논문지 14 (2) : 179 ~ 189 [2013]
  • What Influences IT Ethical Behavior Intentions -Planned Behavior, Reasoned Action, Perceived Importance, Individual Characteristics?
    Leonard, L.N.K Information and Management 42 (1) : 143 ~ 158 [2004]
  • Understanding and Addressing Criminal Opportunity:The Application of Situational Crime Prevention to IS Security
    Willson, R Journal of Financial Crime 7 (3) : 201 ~ 210 [2000]
  • Toward a Theory of Criminal Deterrence
    Silberman, M American Sociological Review 41 (3) : 442 ~ 461 [1976]
  • The theory of planned behavior
    Ajzen, I. Organizational Behavior and Human Decision Processes 50 (2) : 179 ~ 211 [1991]
  • The partial least squares approach to structural equation modeling
    Chin, W. W. Modern methods for business research 295 (2) : 295 ~ 336 [1998]
  • The Vignette Technique in Survey Research
    Finch, J. Sociology 21 (1) : 105 ~ 114 [1987]
  • The Rationality of Sexual Offending:Testing a Deterrence/Rational Choice Conception of Sexual Assault
    Bachman, R Law and Society Review 26 (2) : 343 ~ 372 [1992]
  • The Partial Least Squares Approach to Causal Modeling:Personal Computer Adoption and Use as an Illustration
    Barclay, D.C Technology Studies 2 (2) : 285 ~ 308 [1995]
  • The Importance of Security Awareness Traing
  • The Impact of Deterrent Countermeasures upon Individual Intent to Commit Misuse:A Behavioral Approach
    Foltz, C. B. University of Arkansas [2000]
  • The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions
    Harrington, S.J MIS Quarterly 20 (3) : 257 ~ 278 [1996]
  • The Dynamics of Organizational Information Security
    Dutta, A Proceedings of the Twenty-Fourth International Conference on Information Systems [2003]
  • The Domino Effect of Password Reuse
    Ives, B Communications of the ACM 47 (4) : 75 ~ 78 [2004]
  • Structural Equation Modeling Techniques and Regression:Guidelines for Research Practice
    Gefen, D Communications of the AIS 7 (7) : 1 ~ 78 [2000]
  • Software Piracy in the Workplace:A Model and Empirical Test
    Peace, A.G Journal of Management Information System 20 (1) : 153 ~ 177 [2003]
  • Sanctions and Social Deviance:The Question of Deterrence
    Tittle, C.R Praeger [1980]
  • Research In Criminal Deterrence:Laying the Groundwork for the Second Decade
    Cook, P. J. Crime and Justice 2 : 211 ~ 268 [1880]
  • Psychometric Theory
    Nunnally, J.C McGraw-Hill [1978]
  • Protecting Organizational Information Resources
    Wybo, M.D Information Resources Management Journal 2 (4) : 1 ~ 15 [1989]
  • Multivariate Data Analysis
    Hair, J.F Prentice Hall [1998]
  • Monitoring for Pornography and Sexual Harrassment
    Panko, R.R Communications of the ACM 45 (1) : 84 ~ 87 [2002]
  • Managing and Controlling Computer Misuse
    Dhillon, G. Information Management and Computer Security 7 (4) : 171 ~ 175 [1999]
  • Integrating Celerity, Impulsivity, and Extralegal Sanction Threats into a Model of General Deterrence and Evidence
    Nagin, D.S Criminology 39 (4) : 865 ~ 891 [2001]
  • Information security management:Global challenges in the new millenium
    Whitman, M.E Idea Group Publishing [2001]
  • Information Assurance and Security
    Schou, C.D Journal of Organizational and End User Computing 16 (3) : 1 ~ 7 [2004]
  • In Deterrence and incapacitation:Estimating the effexts of criminal sanctions on crime rates
    Nagin, D.S National Academy of Sciences [1978]
  • Foundations of Behavioral Research
    Kerlinger, F.N Holt, Rinehart and Winston [1973]
  • Fighting Computer Crime
    Parker, D.B John Wiley and Sons [1998]
  • Evaluating Structural Equation Models with Unobser- vable Variables and Measurement Error
    Fornell, C. Journal of Marketing Research 18 (1) : 39 ~ 50 [1981]
  • Effective IS Security:An Empirical Study
    Straub, D.W Information Systems Research 1 (3) : 255 ~ 276 [1990]
  • Economics of IT Security Management:Four Improvements to Current Security Practices
    Cavusoglu, H Communications of the AIS 14 (3) : 65 ~ 75 [2004]
  • Does Electronic Monitoring of Employee Internet Usage Work?
    Urbaczewski, A Communications of the ACM 45 (1) : 80 ~ 83 [2002]
  • Discovering and Disciplining Computer Abuse in Organizations:A Field Study
    Straub, D.W MIS Quarterly 14 (1) : 45 ~ 60 [1990]
  • Designing a Security Awareness Program:Part 1
    Hansche, S. Information Systems Security 9 (6) : 14 ~ 22 [2001]
  • Crime Perceptions in a Natural Setting by Expert and Novice Shoplifters
    Weaver, F.M Social Psychology Quarterly 48 (4) : 349 ~ 359 [1985]
  • Coping with Systems Risk:Security Planning Models for Management Decision Making
    Straub, D.W MIS Quarterly 22 (4) : 441 ~ 469 [1998]
  • Computer-Related Embezzlement
    Solarz, A. Computers and Security 6 (1) : 49 ~ 53 [1987]
  • Computer Crime-Numbers Lie
    Saari, J Computers and Security 6 (2) : 111 ~ 117 [1987]
  • Behavioral Information Security:Defining the Criterion Space
    Stanton, J.M The Systems Assurance Institute, Syracuse University [2003]
  • Attitude, Personality, and Behavior
    Ajzen, I. Dorsey Press [1988]
  • Assessing Construct Validity in Organizational Research
    Bagozzi, R.P Administrative Science Quarterly 36 (3) : 421 ~ 458 [1991]
  • Anintegrative study of information systems security effectiveness
    A. Kankanhalli Kankanhalli Kankanhalli, A. Journal of Information Management 23 (2) : 139 ~ 154 [2003]
  • An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theorices
    Lee, S.M Information and Management 41 (6) : 707 ~ 718 [2004]
  • An Experimental Comparison of Secret-Based User Authentication Technologies
    Irakleous, I Information Management and Computer Security 10 (3) : 100 ~ 108 [2002]
  • A conceptual foundation for organizational information security awareness
    Siponen, M. T. Information Management and Computer Security 8 (1) : 31 ~ 41 [2000]
  • A Prototype Tool for Information Security Awareness and Training
    Furnell, S.M Logistics Information Management 15 (5) : 352 ~ 357 [2002]
  • A Primer for Soft Modelling
    Falk, R.F Univ. of Akron Press [1992]
  • A Holistic Model of Computer Abuse within Organizations
    Lee, J Information Management and Computer Security 10 (2) : 57 ~ 63 [2002]
  • 2004 CSI/FBI Computer Crime and Security Survey
    Gordon, L.A Computer Security Journal 20 (3) : 33 ~ 51 [2004]