2007
DOI: 10.1016/j.im.2007.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Threats and countermeasures for information system security: A cross-industry study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
58
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 100 publications
(59 citation statements)
references
References 29 publications
(25 reference statements)
1
58
0
Order By: Relevance
“…These threats can be broadly categorized as relating to the interruption, interception, modification or fabrication of information resources (Yeh and Chang, 2007). Sources of these threats may be either internal or external to the organization and originate from human or nonhuman actors (Goodhue and Straub, 1991;Loch et al, 1992;Straub and Welke, 1998).…”
Section: Threats To It Resourcesmentioning
confidence: 99%
See 1 more Smart Citation
“…These threats can be broadly categorized as relating to the interruption, interception, modification or fabrication of information resources (Yeh and Chang, 2007). Sources of these threats may be either internal or external to the organization and originate from human or nonhuman actors (Goodhue and Straub, 1991;Loch et al, 1992;Straub and Welke, 1998).…”
Section: Threats To It Resourcesmentioning
confidence: 99%
“…Because IT and its associated risk are relatively new phenomena that are continually adapting and emerging, limited historical data exist from which to predict future outcomes (Dhillon and Backhouse, 2001). In addition to these shortcomings, scholars have been criticized for failing to account for the temporal nature of IT risk as well as the non-financial impacts of IT disruptions (Raghupathi, 2007;Suh, 2003;Yeh and Chang, 2007).…”
Section: Threats To It Resourcesmentioning
confidence: 99%
“…For the clear understanding of the IS Threats, researchers used criminology perception [4] to assemble security approaches into various categories as given in table.1 as under [5]:…”
Section: Introductionmentioning
confidence: 99%
“…A particular risk arises from the possibility of unauthorized disclosure, modification or removal of a larger amount of a significant information without leaving traces of an unauthorized access [6,7,8]. A particular attention should be paid nowadays to ensure an appropriate, understandable as a secure, access to such a type of systems [9,10]. The choice of methods to ensure the security of the IT systems in a given organization should be relevant to the type of risk.…”
Section: Introductionmentioning
confidence: 99%