A segurança dos sistemas de informação e o comportamento dos usuários
Abstract
Keywords
Full Text:
PDF (Português (Brasil))References
Albrechtsen, E. (2007). A qualitative study of users' view on information security. Computers & Security, 26 (4), 276-289.
Dhillon, G. (2001). Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns. Computers & Security, 20 (2), 165-172.
Dhillon, G. (2004). Realizing benefits on an information security program. Business Process Management Journal, 10 (3), 260-261.
Dhillon, G. (2005). Gaining benefits from IS/IT implementations: interpretations from case studies. International Journal of Information Management, 25 (6), 502-515.
Dhillon, G., & Backhous, J. (2000). Information systems security management in the new millenium. Communications of the ACM, 43 (7), 125-128.
Furnell, S., & Thomson, K.-L. (2009). From Culture to disobedience: recognising the varying user acceptance of IT security. Computer Fraud & Security, 2009 (2), 5-10.
Gaivéo, J. M. (2008). As pessoas nos sistemas de gestão da segurança da informação (tese de doutoramento). Lisboa, Portugal. Obtido de http://repositorioaberto.uab.pt/handle/10400.2/1272
Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47 (2), 154-165.
Knapp, K. J., Morris, R. F., Marshall, T. E., & Byrd, T. A. (2009). Information security policy: An organizational-level process model. Computers & Security, 28 (7), 493-508.
Kruger, H. A., & Kearney, W. D. (2008). Consensus Ranking - An ICT security awareness case study. Computers & Security, 27 (7), 493-508.
Kruger, H. A., Drevin, L., & Steyn, T. (2006). A Framework for Evaluating ICT Security Awareness. Proceedings of the 2006 Information Security South Africa Conference, (pp. 1-11). Sandton.
Leach, J. (2003). Improving user security behaviour. Computers & Security, 22 (8), 685-692.
Mamede, H. S. (2006). Segurança informática nas organizações. Lisboa: FCA Editora Informática.
Ng, B.-Y., Kankanhalli, A., & Xu, Y. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46 (5), 815-825.
Rhee, H.-S., Cheongtag, K., & Ryu, Y. U. (2009). Self-Efficacy in Information Security: Its Influence on End Users’ Information Security Practice Behavior. Computers & Security, 28 (8), 816-826.
Rodrigues, L. S. (2002). Arquitecturas dos sistemas de informação. Lisboa: FCA Editora de Informática.
Serrano, A., & Jardim, N. (2007). Disaster recovery: um paradigma na gestão do conhecimento. Lisboa: FCA Editora de Informática.
Varajão, J. Q. (1998). A Arquitectura da gestão de sistemas de informação.Lisboa: FCA Editora de Informática.
Workman, M., Bommer, W. H., & Straub, D. (2008). Security lapses and the omission of information security measures: A threat control model and empirical test. Computers in Human Behavior, 24 (6), 2799-2816.
DOI: http://dx.doi.org/10.4301/S1807-17752016000300010
Copyright (c) 2016 Journal of Information Systems and Technology Management