박사

정보보안전략이 정보보안 준수의도에 미치는 영향에 관한 연구

논문상세정보

' 정보보안전략이 정보보안 준수의도에 미치는 영향에 관한 연구' 의 참고문헌

  • www.us-cert.gov/GFIRST/presentations/2011/Combating_Databas e_Insider_Threat.pdf
  • www.us-cert.gov, <Insider Threats and Security Trends: Lessons Learned from Actual Insider Attacks
    www.us-cert.gov
  • User acceptance of computer technology A comparison of two theoretical models
    User Acceptance of Computer Technology: A Comparison of Two Theoretical Models [1989]
  • User Behavior Towards Protective Information Technologies: The Role of National Cultural Differences
    [2008]
  • User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
  • User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts
    Davis User Acceptance of Information Technology: System Characteristics [1993]
  • Understanding the Perpetration of Employee Computer Crime in the Organisational Context
    Willison [2006]
  • Understanding the Importance of and Implementing Internal Security Measures
    Durgin [2007]
  • Threats to Information Systems: Today’s Reality, Yesterday's Understanding
    Carr Loch Warkentin Threats to Information Systems: Today’s Reality [1992]
  • Thetheoryofplannedbehaviourandexercise:Aninvestigationintotheroleofpriorbehavior,behavioralintentionsand attitudevariability
    Norman Smith The theory of planned behaviour and exercise: an investigation into the role of prior behavior [1995]
  • Theoretical Integration of User Satisfaction and Technology Acceptance
    Todd Wixom [2005]
  • The theory of planned behavior: The effects of perceived behavioral control and self-efficacy
    O&apos;Leary Terry The theory of planned behavior: The effects of perceived behavioral control and self-efficacy [1995]
  • The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault
  • The insider threat to information systems and the effectiveness of ISO17799
  • The Theory of Planned Behavior
    The Theory of Planned Behavior [1985]
  • The Moderator-mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic and Statistical Considerations
    David A.Kenny Reuben M.Baron The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual [1986]
  • The Last Line of Defense: Motivating Employees to Follow Corporate Security Guideliness
    Boss Kirsch [2007]
  • The IT way of loafing on the job : cyberloafing, neutralizaing and organizational justice
    Vivien K.G.LIM The IT way of loafing on the job : cyberloafing [2002]
  • Techniques of neutralization: Atheory of delinquency
    Matza Sykes [1957]
  • Studying users' computer security behavior - A health belief perspective
  • Structural equation modeling and regression: Guidelines for research practice
    Boudreau Gefen Straub Structural Equation Modeling And Regression: Guidelines For Research Practice [2000]
  • Strategic Approach to Information Security in Organizations
  • Stop Attackers in Their Tracks-Addressing the Insider Threat
    Josh Shaul [2011]
  • SmartPLS (Release 2.0 (beta)), University of Hamburg, Hamburg
    Ringle Wende Will SmartPLS (Release 2.0 (beta)) [2005]
  • Self-efficacy Mechanism in Human Agency
    Bandura Self-efficacy mechanism in human agency [1982]
  • Self-discrepancies: A theory relating self and affect
    Higgins [1987]
  • Security Concerns of System Users: A Study of Perception of the Adequacy of Security
  • Rational Choice, Agency and Thoughtfully Reflective Decision Making: The Short and Long-Term Consequences of Making Good Choices
    Paternoster Pogarsky Rational Choice [2009]
  • Punishment and ethics deterrents: A study of insidersecurity contravention
    J.Gathegi Workman Punishment and ethics deterrents: A study of insider security contravention [2006]
  • Psychometric theory, 2nd edn
    Nunnally Psychometric Theory(2nd Edn.) [1978]
  • Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
  • Protection Motivation Theory of Fear Appeals and Attitude Change
    Rogers [1975]
  • Prediction of goal-directed behavior: Attitudes, intentions, andperceived behavioral control
    Ajzen T.Madden Prediction of goal-directed behavior. Attitudes [1986]
  • Predicting user intentions:Comparing the technology acceptance model with the theory of planned behavior
    Predicting User Intentions; Comparing the Technology Acceptance Model with the Theory of Planned Behavior [1991]
  • Perspectives on Crime and Deviance (3rd ed.)>, Upper Saddle River
    Liska Steven F.M Perspectives on Crime and Deviance (3rd ed.)> [1999]
  • Performance Incentives and Means: How Regulatory Focus Influences Goal Attainment
  • Perceived Usefulness, Perceived Ease of Use and UserAcceptance of Information Technology
    Davis Perceived Usefulness [1989]
  • PLS Path Modeling
    C.Lauro Tenenhaus V.V.Esposito PLS path modeling [2005]
  • Neutralizing in the workplace: an empirical analysis of property theft and production deviance
    Hollinger [1991]
  • Neutralization : New Insights into the Problem of Employee Information Systems Security Policy Violations
  • Managing Employee Compliance with Information Security Policies-The Critical Role of Top Management and Organizational Culture
    Qing Hu [2012]
  • Knowledge, strategy and the theory of the firm
    Liebeskind Zack Knowledge [1996]
  • Issues and Opinions on Structural Equation Modeling
    Chin [1998]
  • Intrinsic motivation and self-determination in human behavior
    Deci, Edward L Intrinsic Motivation and Self-determination in Human Behavior [1985]
  • Internet Users Information Privacy Concerns(IUIPC), The Construct, The Scale, and a Causal Model
    J.Agarwal Malhotra S.S.Kim Internet Users’ Information Privacy Concerns(IUIPC): The Construct [2004]
  • Interdependency of the Determinants of User Interaction and Usage; An Empirical Test
    King Xia [1996]
  • Information Security Policy Compliance : An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
  • Information Security Management : A Hierarchical Framework for Various Approaches
  • Information Security Control Resources inOrganizations: A Multidimensional View and Their Key Drivers
  • Information Security Breaches Survey : 2008 BERR Executive Summary
  • Individual Acceptance of Information Technologies」, in Framing the Domains of IT Management: Projecting the FutureThrough the Past, R. W. Zmud (ed)
    Agarwal Individual Acceptance of Information Technologies」 [2000]
  • In defense of the realm: Understanding the threats to information security
    Whitman [2004]
  • From policies to culture
  • From Intentions to Actions: A theory of PlannedBehavior In J. Kuhl & J. Beckmann (Eds.)
    Ajzen From Intentions to Actions: A Theory of Planned Behavior. In J. Kuhl & J. Beckmann(Eds.) [1985]
  • Fear Appeals and Information Security Behaviors: An Empirical Study
  • Extending the Theory of Planned Behaviour: A Review and Avenues for Further Research
  • Enforcement policy and corporate misconduct: The changing perspective of deterrence theory
    Scholtz [1997]
  • Employees’ Behavior towards IS Security Policy Compliance」, in Proceedings of the 40th Hawaii International Conference on System Sciences, Los Alamitos
    Mahmood Pahnila Siponen Employees’ Behavior towards IS Security Policy Compliance」 [2007]
  • Employee Behaviour Key to Improving Information Security, New Survey Finds
    Price Waterhouse Coopers Employee Behaviour Key to Improving Information Security [2008]
  • Emotional responses to goal attainment: Strength of regulatory focus as moderator
    Higgins [1997]
  • Effective IS security: An empirical study
    Straub [1990]
  • Discovering and disciplining computer abuse in organizations: A field study
  • Diffusing the Internet in the Arab world: The role of social norms and technological culturation
  • Development of Security Policies
  • Deterrence; The Elusive Dependent Variable
    Lebow.R.N [1990]
  • Deterrence and International Conflict: Empirical Findings and Theoretical Debate
    Huth [1999]
  • Current Directions in Information Security Research: Toward Socio-Organizational Perspectives
  • Coping with Systems Risk: Security Planning Models for Management Decision Making
    Straub [1998]
  • Computer-based monitoring: Common perceptions and empirical results
    George [1996]
  • Computer security management>
  • Computer Security in the Real World
  • Causes of Delinquency, Berkeley
    Hirschi Causes of Delinquency [1969]
  • Belief, attitude, intention, and behavior: An introduction to theory and research
    Ajzen Frishbein Belief [1975]
  • Behavioral and Policy Issues in Information Systems Security: The Insider Threat
  • Attack Intelligence Research Center Annual Threat Report: 2008 Overview and 2009 Predictions
    AIRC [2008]
  • Analyzing home PC security adoption behavior
  • An Integrated Study of Information Systems Security Effectiveness
  • Adoption Studies of Electronic Commerce Applications; An Empirical Investigation of Internet Banking Systems
    Goh [1997]
  • A design theory for information security awareness
    Puhakainen A Design Theory for Information Security Awareness [2006]
  • A Field Investigation of Causal Relations among Cognitions, Affect, Intentions, and Behavior
    Bagozzi A Field Investigation of Causal Relations among Cognitions [1982]