Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.5.79

Comparison of Users' Perception of Information Security Elements on Computer Virus Between Large and Small-and-Medium Companies  

Kim, Jong-Ki (Pusan National University)
Jeon, Jin-Hwan (Research and Education Institute of Banking, Securities and Derivatives of Pusan National University)
Abstract
Computer virus is one of the most common information security problems in the information age. This study investigates the difference of users' perception of security elements between large companies and small-and-medium companies on the subject of computer virus. Based on t-test, no significant difference is found in users' perception on security threat and security risk While users satisfy with the level of security policy, there is a significant difference on the level of security policy recognition between the two sizes of companies. Moreover, there are significant differences on information assets, security vulnerability and security effectiveness, which implies difference in the users' perception on importance of assets, exposure to threats and computer virus prevention efforts between large and small-and-medium companies.
Keywords
computer virus; security policy; security risk; security effectiveness; security perception;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Finne, T., 'A Conceptual Framework for Information Security Management,' Computers & Security, Vol. 17, No. 4, pp. 303-307, 1998   DOI   ScienceOn
2 David, J., 'The New Face of the Virus Threat,' Computers & Security, Vol. 15, No. 1, pp. 13-16, 1996   DOI   ScienceOn
3 Kankanhalli, A., H. Teo, B. Tan, and K. Wei, 'An Integrative Study of Information Systems Security Effectiveness,' International Journal of Information Management, Vol. 23, No. 2, pp. 139-154, 2003   DOI   ScienceOn
4 Post, G. and A. Kagan, 'Management Tradeoffs in Anti-Virus Strategies,' Information & Management, Vol. 37, No. 1, pp. 13-24, 2000   DOI   ScienceOn
5 White, S., Open Problems in Computer Virus Research, IBM Thomas J. Watson Research Center, NY USA, 1998
6 Hubbard, J. and K. Forcht, 'Computer Viruses: How Companies Can Protect Their Systems,' Industrial Management & Data Systems, Vol. 98, No. 1, pp. 12-16, 1998   DOI   ScienceOn
7 Wen, H., 'Internet Computer Virus Protection Policy,' Information Management & Computer Security, Vol. 6, No. 2, pp. 66-71, 1998   DOI   ScienceOn
8 BSI, BS7799: Code of Practices for information Security Management, United Kingdom, 1999
9 Bissett, A. and G. Shipton, 'Some Human Dimensions of Computer Virus Creation and Infection,' International Journal of Human-Computer Studies, Vol. 52, pp. 899-913, 2000   DOI   ScienceOn
10 Wack, J. and L. Carnahan, Computer Viruses and Related Treats: A Management Guide, NIST SP 500-166, National Institute of Standards and Technology, 1989
11 Gordon, S., 'Application Program Security Fighting Spyware and Adware in the Enterprise,' Information systems security, Vol. 14, No. 3, pp. 14-17, 2005   DOI   ScienceOn
12 Cannon, C., 'The Real Computer Virus,' American journalism review, pp. 28-35. Apr., 2001
13 Mtembu, K. and Y. Cairns, 'How to Manage and Reduce Computer Crime,' IS Audit & Control Journal, Vol. 6, pp. 27-31, 1997
14 Agarwal, R. and J. Prasad, 'The Antecedents and Consequents of User Perceptions in Information Technology Adoption,' Decision Support Systems, Vol. 22, No. 1, pp. 15-29, 1998   DOI   ScienceOn
15 Coursen, S., 'Financial Impact of Viruses,' Information Systems Security, Vol. 6, No. 1, pp. 64-70, 1997   DOI
16 Goodhue, D. and D. Straub, 'Security Concerns of System Users: A Study of Perception of the Adequacy of Security,' Information & Management, Vol. 20, No. 1, pp. 13-27, 1991   DOI   ScienceOn
17 Szor, P., The Art of Computer Virus Research and Defense, Addison-Wesley, 2005
18 Tedeschi, B., 'Protect Your Identity,' PCWORLD, pp. 107-112, Dec. 2004
19 CMU/SEI, Operationally Critical Threat, Asset, Vulnerability Evaluation (OCTAVE) Framework, Ver. 1.0, CMU/SEI-99-TR- 017, June 1999
20 Straub, D., 'Effective IS Security: An Empirical Study,' Information System Research, Vol. 1, No. 3, pp. 255-276, 1990   DOI
21 Gasser, M., Building a Secure Computer Systems, Van Nostrand Rienhold Company, 1988
22 Loch, K., H. Carr, and M. Warkentin, 'Threats to Information Systems: Today's Reality, Yesterday's Understanding,' MIS Quarterly, Vol. 16, No. 2, pp. 173-186, 1992   DOI   ScienceOn
23 김세헌, 정보보호 관리 및 정책, 생능, 2002
24 CSE, Guide to Security Risk Management for IT Systems, Communications Security Establishment, Government of Canada, 1996
25 Lee, S., S. Lee, and S. Yoo, 'An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories,' Information & Management, Vol. 41, No. 6, pp. 707-718, 2004   DOI   ScienceOn
26 Jung, B., I. Han, and S. Lee, 'Security Threats to Internet: A Korean Multi-Industry Investigation,' Information & Management, Vol. 38, No. 8, pp. 487-498, 2001   DOI   ScienceOn
27 Lee, J. and Y. Lee, 'A Holistic Model of Computer Abuse within Organizations,' Information Management & Computer Security, Vol. 10, No. 2, pp. 57-63, 2002   DOI   ScienceOn
28 한국정보보호진흥원, 새로운 사이버 위협: 피싱 - 피싱에 따른 기술, 사회, 법제적 대응 및 시사점, 정책기획 05-6K, 한국정보보호진흥원, 2005
29 Stonburner, G., A. Goguen, and A. Feringa, Risk Management Guide for Information Technology Systems, NIST SP 800-30, National Institute of Standard and Technology, 2001
30 CSI, Eighth Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2005
31 Peltier, T., Information Security Risk Analysis, Auerbach, 2001
32 Whitman, M., 'In Defense of the Realm: Understanding the Threats to Information Security,' International Journal of Information Management, Vol. 24, No. 1, pp. 43-57, 2004   DOI   ScienceOn
33 Gogan, J., 'Should 'Personal' Computers Be Personally Allocated?', Journal of Management Information Systems, Vol. 7, No. 4, pp. 91-106, 1991   DOI
34 Straub, D. and W. Nance, 'Discovering and Disciplining Computer Abuse in Organizations: A Field Study,' MIS Quarterly, Vol. 14, No. 1, pp. 45-60, 1990   DOI   ScienceOn
35 Nachenberg, C., 'Computer Virus-Anti Virus Coevolution,' Communications of the ACM, Vol. 40, No. 1, pp. 46-51, 1997   DOI   ScienceOn
36 Russell, D. and G. Gangemi, Computer Security Basics, O'Reilly & Associates, 1991
37 McGraw, G. and G. Morrisett, 'Attacking Malicious Code: A Report to the Infosec Research Council,' IEEE Software, Vol. 17, No. 5, pp. 33-41, 2000
38 ISO/IEC, Guidelines for the management of IT security (GMITS)-Part 1: Concepts and models of IT security, ISO/IEC JTC1 SC27 TR 13335-1, 2000
39 CSI, IPAK: Information Protection Assessment Kit, Computer Security Institute, 1997
40 Gordineer, J., 'Blended Threats: A New Era in Anti-Virus Protection,' Information Systems Security, Vol. 12, No. 3, pp. 45-47, 2003   DOI
41 Sherif, J. and D. Gilliam, 'Deployment of Anti-Virus Software: A Case Study,' Information Management & Computer Security, Vol. 11, No. 1, pp. 5-10, 2003   DOI   ScienceOn
42 Hoffer, J. and D. Straub, 'The 9 to 5 Underground: Are You Policing Computer Crimes?,' Sloan Management Review, Vol. 30, No. 4, pp. 35-43, 1989
43 Skoudis, E. and Zeltser, L., Malware: Fighting Malicious Code, Prentice Hall, 2003
44 Frank, J., B. Shamir, and W. Briggs, 'Security-related Behavior of PC Users in Organizations,' Information & Management, Vol. 21, No. 3, pp. 127-135, 1991   DOI   ScienceOn
45 채서일, 사회과학조사방법론, 학현사, 2003
46 Lee, Y. and K. Kozar, 'Investigating Factors Affecting the Adoption of Anti-Spyware Systems,' Communications of the ACM, Vol. 48, No. 8, pp. 72-77, 2005
47 Thatcher, J. and P. Perrewe, 'An Empirical Examination of Individual Traits as Antecedents to Computer Anxiety and Computer Self-Efficiency,' MIS Quarterly, Vol. 26, No. 4, pp. 381-396, 2002   DOI   ScienceOn
48 Venkatesh, V. and M. Morris, 'Why Don't Men Ever Stop to Ask For Direction? Gender, Social Influence, ad Their Role in Technology Acceptance and Usage Behavior,' MIS Quarterly, Vol. 24, No. 1, pp. 115-139, 2000   DOI   ScienceOn
49 Barsanti, C., 'Modern Network Complexity Needs Comprehensive Security,' Security, Vol. 36, No. 7, pp. 65, 1999
50 Highland, H., 'A History of Computer Viruses: The Famous Trio,' Computer & Security, Vol. 16, No. 5, pp. 416-429, 1997   DOI   ScienceOn
51 김종기, 이동호, 서창갑, '전자상거래환경에서 위험분석방법론의 타당성에 대한 연구,' 정보보호학회논문지, 제14권, 제4호, pp. 61-74, 2004
52 Poston, R., F. Stafford, and A. Hennington, 'Spyware: A View from the (Online) Street,' Communications of the ACM, Vol.48, No. 8, pp. 96-99, 2005   DOI   ScienceOn
53 최운호, 전영태, '대규모 컴퓨터 바이러스/웜의 공격시 종합침해사고대응시스템에서의 자동화된 역추적 절차,' 정보보호학회논문지, 제15권, 제1호, pp. 50-60, 2005
54 Pipkin, D., Information Security - Protecting the Global Enterprise, Hewlett-Packard Professional Books, 2000