254
Views
12
CrossRef citations to date
0
Altmetric
Original Articles

Education and Prevention Relationships on Security Incidents for Home Computers

References

  • Albrechtsen, E. & Hovden, J. (2010). Improving information security awareness and behavior through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4), 432.
  • Ayyagari, R. (2012). An Exploratory Analysis of Data Breaches from 2005-2011: Trends and Insights. Journal of Information Privacy & Security, 8(2), 33–56.
  • Britt, P. (2008). You've Got Mail….and Security Breaches. Information Today, 25(7), 1–1, 44.
  • Brown, C.P. (Jan 1990). Crimes of the Vault. Security Management 34(1), 31.
  • Clarra, C. I. & Johnson, J. (2011). Analyzing Home PC Security Adoption Behavior. Journal of Computer Information Systems, 52(4), 20–29.
  • Cybersecurity ‘starts at home’. (2009, Jun). New Scientist, 202(2711), 19a. Retrieved from http://search.proquest.com/docview/200458808?accountid=5683
  • D'Arcy, J. & Hovav, A. & Galletta, D. (Mar 2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1), 79–98, 155, 157.
  • Denning, T., Kohno, T., & Levy, H. M. (2013). Computer security and the modern home. Association for Computing Machinery. Communications of the ACM, 56(1), 94. Retrieved from http://search.proquest.com/docview/1288885179?accountid=5683
  • Dodge, R. C. & Carver, C. & Ferguson, A. (2007). Phishing for user security awareness. Computers & Security, 26(1), 73.
  • Gage, D. (1996). Companies need more security training programs, study finds. Info World Canada, 21(3), 24–25.
  • Grau, J. (1984). Security Education: Something to Think About. Security Management, 28(10), 24.
  • Greenberg, M. (1986). Security Awareness + Effective Training = Safer Schools. Security Management, 30(8), 47.
  • Kieke, R. L. (2006). Survey shows high number of organizations suffered security breach in past year. Journal of Health Care Compliance, 8(5), 49–50, 67–68.
  • Kim, T. (2004). Lessons on Locking out Human Error: Training staff not to activate viruses inadvertently is at least as important as in securing computer systems, writes Kim Thomas. Financial Times, October 13, 2004.
  • Kirkpatrick, J. (2006). Protect your business against dangerous information leaks. Machine Design, 78(3), 66.
  • Kumar, N., Mohan, K., & Holowczak, R. (2008). Locking the door but leaving the computer vulnerable: Factors inhibiting home users' adoption of software firewalls. Decision Support Systems, 46(1), 254. Retrieved from http://search.proquest.com/docview/206602734?accountid=5683
  • Kruger, H. & Drevin, L. & Steyn, T. (2010). A vocabulary test to assess information security awareness. Information Management & Computer Security, 18(5), 316–327.
  • Ku, C.Y. & Chang, Y.W. & Yen, D. D, (2009). National Information Security Policy and its Implementation: A case study in Taiwan. Telecommunications Policy, 33(7), 371.
  • La Rose, R., Rifon, N. J., & Enbody, R. (2008). PROMOTING PERSONAL RESPONSIBILITY for INTERNET SAFETY. Association for Computing Machinery. Communications of the ACM, 51(3), 71. Retrieved from http://search.proquest.com/docview/237066908?accountid=5683
  • Luo, X. & Liao, Q. (2007). Awareness Education as the key to Ransomware Prevention. Information Security Journal, 16(4), 195–202.
  • McLaughlin, K. (2006). COMPTIA: End-User Training is Critical to Security. CRN, 1194, 35.
  • Mensch, S. & Wilkie, L. (2011). Information Security Activities of College Students: An exploratory study. Academy of Information and Management Sciences Journal, 14(2), 91–116.
  • Mitnick, K. (2002). The Art of Deception. John Wiley & sons, Hoboken, NJ. (p. 3).
  • Ng, B.Y., & Kankanhalli, A., & Xu, Y. (2009).Studying users' computer security behavior: A health belief prospective. Decision Support Systems, 46(4), 815–825.
  • O'Dell, R. (2008). Computer security: Enabling the digital lifestyle. Rural Telecommunications, 27(3), 40–40, 42, 44. Retrieved from http://search.proquest.com/docview/202688719?accountid=5683
  • Okenyi, P.O. & Owens, T. J., (2007). On the anatomy of human hacking. Information Systems Secuirty, 16, 302–314.
  • Peltier, T. (2005). Implementing an information security awareness program. EDPACS, 33(1), 1–18.
  • Pollitt, D. (2005). Energis Trains Employees and Customers in IT Security. Human Resource Management Digest, 13(2), 25–28.
  • Puhakainen, P. & Siponen, M., (2010). Improving Employees' Compliance through Information Systems Security Training: An Action Research Study. MIS Quarterly, 34(4), 757.
  • Radcliff, D. (1997). Network Security: Mission Impossible? Software Magazine, 17(1), 60–66.
  • Rezui, Y & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7/8), 241.
  • Rhee, H., & Ryu, Y. U., & Kim, C. (2012). Unrealistic optimism on information security management. Computers & Security, 31(2), 221. Retrieved from http://search.proquest.com/docview/923242208?accountid=5683
  • Rotvoid, G. & Landry, R. (2007). Status of security awareness in business organizations and colleges of business: an alnaysis of training and education, policies, and social engineering testing. Dissertation, Univeristy of North Dakota.
  • Schultz, E. (2004). Security training and awareness -? fitting a square peg in a round hole. Computers & Security, 23, 1–2.
  • Schultz, E. E. (2012, Sep 07). Family computer crimes. Wall Street Journal (Online). Retrieved from http://search.proquest.com/docview/1038369686?accountid=5683
  • Sherizen, S. (1984). Successful Security Relies on Corporate Awareness Training. Data Management, 22(2), 10.
  • Siponen, M. (2000). A conceptual foundation for organizational information security awareness. Information Management & Computer Security, 8(1), 31–41.
  • Stanton, L. (2010). CYBERSECURITY EXPERTS SEE NEED TO MODIFY ‘REACTIVE’ STRATEGY. Cybersecurity Policy Report, 1. Retrieved from http://search.proquest.com/docview/767101096?accountid=5683
  • Wagley, J. (2010). Breaches Lead to Employee Training. Security Management, 54(4), 44.
  • Weinstein, N.D. & Klein, W.M. (1996). Unrealistic optimism: Present and future. Journal of Social and Clinical Psychology, 15, pp. 1–8
  • White, G. (2010). “The Evolution and Implementation of Global Assurance.” Issues in Information Systems, 11(1), 35–40. (Also appears in PROCEEDINGS of the International Association for Computer Information Systems, Las Vegas, NV, October 6-9, 2010).
  • White, G. (2012 November). “Information Security Education Relationships on Incidents and Preventions: Cyber Assurance Literacy Needs.” PROCEEDINGS of the 2012 Annual Information Systems Educators Conference (ISECON), New Orleans, LA; November 1-4, 2012.
  • Wolf, M. & Haworth, D. & Pietron, L. (2011). Measuring an Information Security Awareness Program. The Review of Business Information Systems, 15(3), 9–21.
  • Yoon, C. & Hwang, J.W. & Kim, R. (2012). Exploring Factors that Influence Students' Behaviors in Information Security. Journal of Information Systems Education, 23(4), 407–415.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.