연구동향 분석
홈
알림
이용안내
오류접수
API
서비스소개
인기 연구 키워드 :
인기 활용 키워드 :
박사
정보보안전략이 정보보안 준수의도에 미치는 영향에 관한 연구
박종원
박종원
2013년
활용도 Analysis
논문 Analysis
연구자 Analysis
활용도 Analysis
논문 Analysis
연구자 Analysis
활용도
공유도
영향력
논문상세정보
저자
박종원
박종원
참고문헌( 82)
유사주제 논문( 0)
인용/피인용
정보보안전략이 정보보안 준수의도에 미치는 영향에 관 ...
' 정보보안전략이 정보보안 준수의도에 미치는 영향에 관한 연구'
의 참고문헌
www.us-cert.gov/GFIRST/presentations/2011/Combating_Databas e_Insider_Threat.pdf
www.us-cert.gov, <Insider Threats and Security Trends: Lessons Learned from Actual Insider Attacks
www.us-cert.gov
User acceptance of computer technology A comparison of two theoretical models
User Acceptance of Computer Technology: A Comparison of Two Theoretical Models
[1989]
User Behavior Towards Protective Information Technologies: The Role of National Cultural Differences
[2008]
User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach
D’Arcy
D’Arcy, J.
Galletta
Hovav
[2009]
User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts
Davis
User Acceptance of Information Technology: System Characteristics
[1993]
Understanding the Perpetration of Employee Computer Crime in the Organisational Context
Willison
[2006]
Understanding the Importance of and Implementing Internal Security Measures
Durgin
[2007]
Threats to Information Systems: Today’s Reality, Yesterday's Understanding
Carr
Loch
Warkentin
Threats to Information Systems: Today’s Reality
[1992]
Thetheoryofplannedbehaviourandexercise:Aninvestigationintotheroleofpriorbehavior,behavioralintentionsand attitudevariability
Norman
Smith
The theory of planned behaviour and exercise: an investigation into the role of prior behavior
[1995]
Theoretical Integration of User Satisfaction and Technology Acceptance
Todd
Wixom
[2005]
The theory of planned behavior: The effects of perceived behavioral control and self-efficacy
O'Leary
Terry
The theory of planned behavior: The effects of perceived behavioral control and self-efficacy
[1995]
The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault
Bachman
R.Paternoster
[1992]
The insider threat to information systems and the effectiveness of ISO17799
S.Kokolakis
Theoharidou
[2005]
The Theory of Planned Behavior
The Theory of Planned Behavior
[1985]
The Moderator-mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic and Statistical Considerations
David A.Kenny
Reuben M.Baron
The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual
[1986]
The Last Line of Defense: Motivating Employees to Follow Corporate Security Guideliness
Boss
Kirsch
[2007]
The IT way of loafing on the job : cyberloafing, neutralizaing and organizational justice
Vivien K.G.LIM
The IT way of loafing on the job : cyberloafing
[2002]
Techniques of neutralization: Atheory of delinquency
Matza
Sykes
[1957]
Studying users' computer security behavior - A health belief perspective
A. Kankanhalli
[2009]
Structural equation modeling and regression: Guidelines for research practice
Boudreau
Gefen
Straub
Structural Equation Modeling And Regression: Guidelines For Research Practice
[2000]
Strategic Approach to Information Security in Organizations
S. Park
T.Ruighaver
[2008]
Stop Attackers in Their Tracks-Addressing the Insider Threat
Josh Shaul
[2011]
SmartPLS (Release 2.0 (beta)), University of Hamburg, Hamburg
Ringle
Wende
Will
SmartPLS (Release 2.0 (beta))
[2005]
Self-efficacy Mechanism in Human Agency
Bandura
Self-efficacy mechanism in human agency
[1982]
Self-discrepancies: A theory relating self and affect
Higgins
[1987]
Security Concerns of System Users: A Study of Perception of the Adequacy of Security
D.Straub
Goodhue
[1991]
Rational Choice, Agency and Thoughtfully Reflective Decision Making: The Short and Long-Term Consequences of Making Good Choices
Paternoster
Pogarsky
Rational Choice
[2009]
Punishment and ethics deterrents: A study of insidersecurity contravention
J.Gathegi
Workman
Punishment and ethics deterrents: A study of insider security contravention
[2006]
Psychometric theory, 2nd edn
Nunnally
Psychometric Theory(2nd Edn.)
[1978]
Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
Herath
Herath, T.
Rao
[2009]
Protection Motivation Theory of Fear Appeals and Attitude Change
Rogers
[1975]
Prediction of goal-directed behavior: Attitudes, intentions, andperceived behavioral control
Ajzen
T.Madden
Prediction of goal-directed behavior. Attitudes
[1986]
Predicting user intentions:Comparing the technology acceptance model with the theory of planned behavior
Predicting User Intentions; Comparing the Technology Acceptance Model with the Theory of Planned Behavior
[1991]
Perspectives on Crime and Deviance (3rd ed.)>, Upper Saddle River
Liska
Steven F.M
Perspectives on Crime and Deviance (3rd ed.)>
[1999]
Performance Incentives and Means: How Regulatory Focus Influences Goal Attainment
E.T.Higgins
R.S.Friedman
Shah
[1998]
Perceived Usefulness, Perceived Ease of Use and UserAcceptance of Information Technology
Davis
Perceived Usefulness
[1989]
PLS Path Modeling
C.Lauro
Tenenhaus
V.V.Esposito
PLS path modeling
[2005]
Neutralizing in the workplace: an empirical analysis of property theft and production deviance
Hollinger
[1991]
Neutralization : New Insights into the Problem of Employee Information Systems Security Policy Violations
Anthony
Siponen
[2010]
Managing Employee Compliance with Information Security Policies-The Critical Role of Top Management and Organizational Culture
Qing Hu
[2012]
Knowledge, strategy and the theory of the firm
Liebeskind
Zack
Knowledge
[1996]
Issues and Opinions on Structural Equation Modeling
Chin
[1998]
Intrinsic motivation and self-determination in human behavior
Deci, Edward L
Intrinsic Motivation and Self-determination in Human Behavior
[1985]
Internet Users Information Privacy Concerns(IUIPC), The Construct, The Scale, and a Causal Model
J.Agarwal
Malhotra
S.S.Kim
Internet Users’ Information Privacy Concerns(IUIPC): The Construct
[2004]
Interdependency of the Determinants of User Interaction and Usage; An Empirical Test
King
Xia
[1996]
Information Security Policy Compliance : An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
Bulgurcu
Bulgurcu, B.
Izak
[2010]
Information Security Management : A Hierarchical Framework for Various Approaches
Eloff
S.H.von Solms
[2000]
Information Security Control Resources inOrganizations: A Multidimensional View and Their Key Drivers
Benbasat
Cavusoglu
[2009]
Information Security Breaches Survey : 2008 BERR Executive Summary
Price Waterhouse Coopers
[2008]
Individual Acceptance of Information Technologies」, in Framing the Domains of IT Management: Projecting the FutureThrough the Past, R. W. Zmud (ed)
Agarwal
Individual Acceptance of Information Technologies」
[2000]
In defense of the realm: Understanding the threats to information security
Whitman
[2004]
From policies to culture
B.von Solms
Von Solms
[2004]
From Intentions to Actions: A theory of PlannedBehavior In J. Kuhl & J. Beckmann (Eds.)
Ajzen
From Intentions to Actions: A Theory of Planned Behavior. In J. Kuhl & J. Beckmann(Eds.)
[1985]
Fear Appeals and Information Security Behaviors: An Empirical Study
Johnston
Merrill
[2010]
Extending the Theory of Planned Behaviour: A Review and Avenues for Further Research
Armitage
Conner
[1998]
Enforcement policy and corporate misconduct: The changing perspective of deterrence theory
Scholtz
[1997]
Employees’ Behavior towards IS Security Policy Compliance」, in Proceedings of the 40th Hawaii International Conference on System Sciences, Los Alamitos
Mahmood
Pahnila
Siponen
Employees’ Behavior towards IS Security Policy Compliance」
[2007]
Employee Behaviour Key to Improving Information Security, New Survey Finds
Price Waterhouse Coopers
Employee Behaviour Key to Improving Information Security
[2008]
Emotional responses to goal attainment: Strength of regulatory focus as moderator
Higgins
[1997]
Effective IS security: An empirical study
Straub
[1990]
Discovering and disciplining computer abuse in organizations: A field study
Straub
W.D.Nance
[1990]
Diffusing the Internet in the Arab world: The role of social norms and technological culturation
D.Straub
Loch
[2003]
Development of Security Policies
J. ?lnes
J.Olnes
[1994]
Deterrence; The Elusive Dependent Variable
Lebow.R.N
[1990]
Deterrence and International Conflict: Empirical Findings and Theoretical Debate
Huth
[1999]
Current Directions in Information Security Research: Toward Socio-Organizational Perspectives
Backhouse
Dhillon
[2001]
Coping with Systems Risk: Security Planning Models for Management Decision Making
Straub
[1998]
Computer-based monitoring: Common perceptions and empirical results
George
[1996]
Computer security management>
D. B. Parker
K. A. Forcht
[1981]
Computer Security in the Real World
B. W. Lampson
[2004]
Causes of Delinquency, Berkeley
Hirschi
Causes of Delinquency
[1969]
Belief, attitude, intention, and behavior: An introduction to theory and research
Ajzen
Frishbein
Belief
[1975]
Behavioral and Policy Issues in Information Systems Security: The Insider Threat
Warkentin
Willison
[2009]
Attitudes, personality, and behavior
Ajzen, Icek
Attitudes
[1988]
Attitude organization and change : an analysis of consistency among attitude components
Rosenberg, Milton J
[1960]
Attack Intelligence Research Center Annual Threat Report: 2008 Overview and 2009 Predictions
AIRC
[2008]
Analyzing home PC security adoption behavior
Claar
Johnson
[2012]
An Integrated Study of Information Systems Security Effectiveness
A. Kankanhalli
K.-K.Wei
[2003]
Adoption Studies of Electronic Commerce Applications; An Empirical Investigation of Internet Banking Systems
Goh
[1997]
A design theory for information security awareness
Puhakainen
A Design Theory for Information Security Awareness
[2006]
A Field Investigation of Causal Relations among Cognitions, Affect, Intentions, and Behavior
Bagozzi
A Field Investigation of Causal Relations among Cognitions
[1982]
' 정보보안전략이 정보보안 준수의도에 미치는 영향에 관한 연구'
의 유사주제(
) 논문