최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Information Systems Review, v.12 no.1, 2010년, pp.23 - 42
안중호 (서울대학교 경영대학) , 박준형 (대한민국 육군 3사관학교) , 성기문 (대한민국 공군본부) , 이재홍 (서울대학교 경영대학)
Although organizations are given various benefits with information technologies, they sometimes have suffered fatal damages due to information security incidents now such as computer virus, hacking, counterfeiting, plagiarizing, etc. The fundamentalcauses of information security incidents are closel...
김미희, 이명진, 채기준, 김호원, "센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석", 정보처리학회논문지, 제14-C권, 제3호, 통권 제113호, 2007, pp. 229-238.
김원형, 공기업과 민간기업간 조직풍토 비교분석, 대전대학교 사회과학연구소, 1996.
문태영, 대기업병과 치유방안에 관한 연구, 건국대학교, 1996.
백승훈, 민천홍, "보안통제와 정책이 기업의 보안체계에 미치는 영향에 대한 탐색적 연구", 한국경영정보학회 2004년 춘계학술대회, 2004, pp. 854-860.
윤순봉, 대기업병: 그 실체와 치유방안, 삼성경제연구소, 1994.
이순묵, 공변량 구조 분석, 성원사, 1990.
채서일, 사회과학조사방법론, 학현사, 1997.
하영길, "인터넷 정보보안 기술에 관한 연구", 상업기술연구, 제13호, 2004, pp. 176-187.
홍재영, 대기업병의 증세와 진단, 한국 경영자총협회, 1986.
황윤철, "체계적인 보안 정책 관리를 위한 계층적 보안 모델 설계", 컴퓨터 정보통신 연구, 제9권, 제1호, 2001, pp. 21-32.
Ajzen, I., From intentions to actions: A theory of planned behavior, In From cognition to behavior Action-control, J. Kuhl and J. Beckman (Eds.), Heidelberg, Germany: Springer, 1985.
Akers, R. L., M. D. Krohn, L. Lanza-Kaduce, and M. Rodosevich, "Social learning and deviant behavior: A specific test of a general theory", American Sociological Review, Vol.44, 1979, pp. 636-655.
Aubert, V., Sociology of law, Baltimore: Penguin Books, 1969.
Benn, S. I. and G. F. Gaus, Public and Private in Social life, New york: Palgrave Macmillan, 1983.
Bozeman, B., All Organizations are Public: Comparing Public and Private Organizations, Beard Books, 1987.
Calluzzo, V. J. and C. J. Cante, "Ethics in information technology and software use", Journal of Business Ethics, Vol.52, 2004, pp. 301-312.
Costa, A. L. and B. Kallick, Assessment in the learning organization: Shifting the paradigm, New York: ASCD Books, 1997.
Harrington, S. J., "The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions", MIS Quarterly, Vol.20, 1996, pp. 257-278.
Hoffer, J. A. and D. W. Straub, "The 9 to 5 underground: Are you policing computer crimes?", Sloan Management Review, Vol.30, 1989, pp. 35-43.
Hsu, M. H. and F. Y. Kuo, "An investigation of volitional control in information ethics", Behavior and Information Technology, Vol.22, 2003, pp. 53-62.
Kankanhalli, A., H. H. Teo, B. C. Y. Tan, and K. K. Wei, "An integrative study of information systems security effectiveness", International Journal of Information Management, Vol.23, 2003, pp. 139-154.
Kurland, N. B., "Ethical intentions and the theories of reasoned action and planned behavior", Journal of Applied Social Psychology, Vol.25, 1995, pp. 297-313.
Lee, J. and Lee, Y., "A holistic model of computer abuse within organizations", Information Management and Computer Security, Vol.10, 2002, pp. 57-63.
NIST, An Introduction to Computer Security: The NIST Handbook, Special Publication 800-12, National Institute of Standards and Technology, 1995.
O'Donoghue, T. and M. Rabin, "The economics of immediate gratification", Journal of Behavioral Decision Making, Vol.13, 2000, pp. 233-250.
Peace, A., G. Graham, F. Dennis, and J. Y. L. Thong, "Software piracy in the workplace: A model and empirical test", Journal of Management Information Systems, Vol.20, 2003, pp. 153-177.
Rahim, M. M. D., A. H. Seyal, and M. N. Rahman, "Factors affecting softlifing intention of computing students: An empirical study", Journal of Educational Computing Research, Vol.24, 2001, pp. 385-405.
Robbins, S. P., Organization Theory: Structure, Design and Applications, Third Edition, Prentice Hall, 1990.
SANS, "The SANS security policy project", Bethesda, MD: SANS Institute(URL: http://www.sans.org/resources/policies), 2005.
Sasse, M. A., "Usability and trust in information systems", Cyber Trust and Crime Prevention Project, University College London, 2004, pp. 1-18.
Schein, E. H., Organizational Culture and Leadership, San Francisco, CA: Jossey-Bass, 1985.
Scholtz, J. T., "Enforcement policy and corporate misconduct: The changing perspective of deterrence theory", Law and Contemporary Problems, Vol.60, 1997, pp. 253-268.
Simpson, P. M., D. Banerjee, and C. L. Simpson, "Softlifting: A model of motivating factors", Journal of Business Ethics, Vol.13, 1994, pp. 431-438.
Straub, D. W., "Effective IS security: An empirical study", Information Systems Research, Vol.1, 1990, pp. 255-276.
Straub, D. W. and W. D. Nance, "Discovering and disciplining computer abuse in organizations: A field study", MIS Quarterly, Vol.14, 1990, pp. 45-60.
Straub, D. W. and R. J. Welke, "Coping with systems risk: Security planning models for management decision-making", MIS Quarterly, Vol.22, 1998, pp. 441-469.
Tapp, J. L. and L. Kohlberg, Developing senses of law and legal justice, In Law, justice, and the individual in society: Psychological and legal issues, J. L. Tapp and F. J. Levine (eds.), New York: Holt, Rinehart and Winston, 1977.
Theoharidou, M., S. Kokolakis, M. Karyda, and E. Kiountouzis, "The insider threat of information systems and the effectiveness of ISO17799", Computers and Security, VoI.24, 2005, pp. 472-484.
Weir, C., "Organizational structure and corporate performance", Management Decision, Vol.33, 1995, pp. 24-32.
Wenzel, M., "The social side of sanctions: Personal and social norms as moderators of deterrence", Law and Human Behavior, Vol.28, 2004, pp. 547-567.
WilIiamson,. O. E., Markets and Hierarchies: Analysis and Antitrust Implications, New York: Macmillan Press, 1975.
Workman, M. and J. Gathegi, "Punishment and Ethics Deterrents: A Study of Insider Security Contravention", Journal of the American Society for Information Science and Technology, Vol.58, No.2, 2006, pp. 212-222.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.