13,612
Views
219
CrossRef citations to date
0
Altmetric
Guest Editorial

Behavioral and policy issues in information systems security: the insider threat

Pages 101-105 | Published online: 19 Dec 2017

References

  • CulnanMMapping the intellectual structure of MIS, 1980–1985: a co-citation analysisMIS Quarterly198711334135310.2307/248680
  • Ernst and Young (2008) Moving beyond compliance: Ernst & Young's 2008 global information security survey. [WWW document] http://www.ey.com/Global/assets.nsf/International/TSRS_Global_Information_Security_Survey_2008/$file/TSRS_Global_Information_Security_Survey_2008.pdf (accessed 1 April 2009).
  • FarhoomandAFScientific progress of management information systemsThe DATA BASE for Advances in Information Systems1987184485610.1145/1017816.1017821
  • FarhoomandAFDruryDHA historiographical examination of information systemsCommunications of the AIS19991127
  • ForchtKComputer Security Management1994
  • ImGBaskervilleRA longitudinal study of information systems threat categories: the enduring problem of human errorThe DATA BASE for Advances in Information Systems2005364687910.1145/1104004.1104010
  • LochKDCarrHHWarkentinMEThreats to information systems: today's reality, yesterday's understandingMIS Quarterly199216217318610.2307/249574
  • ParkerDFighting Computer Crime: A New Framework for Protecting Information1998
  • Siponen M., Willison R. and Baskerville R. (2008) Power and practice in information systems security research. In Proceedings of the International Conference on Information Systems Paris, France, 14–17 December 2008.
  • StantonJMStamKRMastrangeloPJoltonJAnalysis of end user security behaviorsComputers & Security200524212413310.1016/j.cose.2004.07.001
  • StraubDWelkeRCoping with systems risk: Security planning models for management decision makingMIS Quarterly199822444146910.2307/249551
  • VesseyIRameshVGlassRLResearch in information systems: an empirical study of diversity in the discipline and its journalsJournal of Management Information Systems2002192129174
  • WarkentinMEInformation system security and privacyEmerging Information Technologies, Advances in Telematics19955777
  • WarkentinMJohnstonACIT governance and organizational development for security managementInformation Security Policies and Practices20084668
  • WarkentinMDavisKBekkeringEIntroducing the check-off password system (cops): an advancement in user authentication methods and information securityJournal of Organizational and End User Computing2004163415810.4018/joeuc.2004070103
  • WillisonRUnderstanding the perpetration of employee computer crime in the organisational contextInformation and Organization200616430432410.1016/j.infoandorg.2006.08.001
  • Willison R. (2009) Motivations for employee computer crime: understanding and addressing workplace disgruntlement through the application of organisational justice. Working Paper No.1, Copenhagen Business School, Department of Informatics.
  • WillisonRBackhouseJOpportunities for computer abuse: considering systems risk from the offender's perspectiveEuropean Journal of Information Systems200615440341410.1057/palgrave.ejis.3000592

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.