산업보안정책 준수의지 결정요인 연구 : 조직공정성 조절효과 觀點 = Research on the determinants that influence the willingness to comply with the industrial security policy: Focusing on the moderating effects of organizational Justice
'
산업보안정책 준수의지 결정요인 연구 : 조직공정성 조절효과 觀點 = Research on the determinants that influence the willingness to comply with the industrial security policy: Focusing on the moderating effects of organizational Justice' 의 주제별 논문영향력
논문영향력 요약
주제
국가경쟁력
기업역량
동기
산업범죄
산업보안정책
조직공정성
동일주제 총논문수
논문피인용 총횟수
주제별 논문영향력의 평균
1,099
0
0.0%
주제별 논문영향력
논문영향력
주제
주제별 논문수
주제별 피인용횟수
주제별 논문영향력
주제어
국가경쟁력
63
0
0.0%
기업역량
62
0
0.0%
동기
516
0
0.0%
산업범죄
3
0
0.0%
산업보안정책
4
0
0.0%
조직공정성
451
0
0.0%
계
1,099
0
0.0%
* 다른 주제어 보유 논문에서 피인용된 횟수
0
'
산업보안정책 준수의지 결정요인 연구 : 조직공정성 조절효과 觀點 = Research on the determinants that influence the willingness to comply with the industrial security policy: Focusing on the moderating effects of organizational Justice' 의 참고문헌
Wenzel, M. (2004). The Social Side of Sanctions; Personal and Social Norms as Moderators of Deterrence, Law and Humen Behavior, 38(5), 547-567.
Straub. (1990). The "Darth" Side of Technology Use: Cyberdeviant Workplace Behaviors.
Siponen, M. & Vance, A. (2010). Neutralzation: New Insights into the Problem of Employee Information Systems Security Policy Violations, MIS Quarterly, 34(3), 487-502.
Sharma, S., Durand, R. M., & Gur-Arie, O., 1981, “Identification and analysis of moderator variables”, Journal of Marketing Research, 18(3): 291-300.
SPSS18.0 Statistical Package for the Social Sciences 매뉴얼
Ryan, R. M. & Frederick, C. (1997). On energy, personality, and health: Subjective vitality as a dynamic reflection of well-being, Journal of Personality, 65, 529-565.
Rhee, H. S., Kim, C. & Ryu. Y. U. (2009). Self-Efficacy in Information Security: Its Influence on End Users' Information Security Practice Behavior, Computer & Security, 28(8), 916-826.
Potosky, D. (2002). A Field Study of Computer Self-Efficracy Beliefs as an Outcome of Training: The Role of Computer Playfulness, Computer Knowledge, and Performance during Training, Computers in Human Behavior, 18(30), 241-255.
Podsakoff, P. M., Mackenzie, S. B. & Podsakoff, N. P. (2003). Common Mehtods Biases In Baharioral Research: A Critical Review of the Literature and Recommnended Remedies, Journal of Applied Psychology, 88(5), 879-903.
Paternoster, R., & Simpson, s. (1996). Sanction Threats and Appeals to Morality: Testing a Rational Choice Model of Corporate Crime, Law & Society Review, 3(30), 549-583.
Ng, B. Y., Kankanhalli, A. & Xu, Y. C.(2009), "Studying Users' Computer Security Behavior: A Health Belief Perspective." Decision Support Systems, 46(4), 815-825.
Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T. & Vance, A. (2009). What Levels of Moral Reasoning and Valees Explain Adherence to Information Security Rules? An Empirical Study, European Journal of Information Systems, 18(2), 126-139.
Marakas, G. M., Yi, M. Y & Johnson, R. D. (1998). The Multilevel and Multifaceted Characteristics of Computer Self-Efficacy, Information Sestems Research, 9(2), 126-163.
Liang, H. and Xue, Y. (2010). Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidence Perspective, Journal of the Association for Information Systems, 119(7), 394-413.
Leventhal. G. S. (1976). Fairness in social relations. In J. W. Thibaut J.C. Spence, R. C. Carson(Eds), Contemporary topics in Social Psychology, Morristown. N. J: General learning Press, 211-240.
Leventha. G. S. (1980). Organizational Justice and Stress: The Mediating Role of Work-Family Conflict, Journal of Applied Psychology, 89(3), 395-404.
Leonard, L. N. K. & Cronan., T. P. (2001). Illegal, Inapporpriate, and Unethical Behavior in an Information Technology Context: A Study to Explain Influences, Journal of the Association for Information Systems, 1(1), 1-31.
Knapp, K. J., Marshall, T. E., Rainer, R. K. & Ford, F. N. (2006). Information Security: Management's Effect on Culture and Policy, Information Management & Computer Security, 14(1), 24-36.
Kark, R. & Carmeli, A. (2009). Alive and creating: The mediating role of vitality and aliveness in the relationship between psychological safety and creative work involvement. Journal of Organizational Behavior, 30, 785-804.
Johnston, A. C. & Warkention. M.(2010). Fear Appeals and Information Security Behaviors: An Empirical Study, MIS Quarterly, 34(3), 549-566.
Ivancevich, J. M. & Metteson, N. Y. (1980). Stress and Work A managerial Perspective Scot, Foresman & Co, 118-120.
Ifinedo, P. (2012). Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory, Computer & Security, 31(1), 83-95.
Hsu, C., Lee, J. N .& Straub, D. W. (2012). Institutional Influences on Information Systems Security Innovations, Information Systems Research, 239(1), 1-22.
Herath, T. & Rao, H. R. (2009b). Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organizations, European Journal of Information Systems, 18(2), 106-125.
Han Li, R. Sarathy & Zhang, J. (2010). Understanding Compliance with Internet Use Policy: An Integrative Model Based on Command-and-Control and Self-Regulatory Approaches, ICIS 2010 Proceedings, 1-14.
Hair, J. F., Blzck, W. C., Bobin, B. J., Anderson, R. E. & Tathen, R. L. (2006), Multivariate Data Analysis, 6th Edition, Upper Saddle, River, NJ; Pearson,
Guo, K. H., Yuan, Y, Archer, N. P. & Connelly, C. E. (2011). Understanding Nomnalicious Security Violations in the Workplace: A Composite Behavior Model, Journal of Management Information Systems, 28(2), 203-236.
Greenberg, J., 1986. Determinants of perceived fairness of performance evaluations. Journal of Applied Psychology. 71: 340-342.
Greenberg, J. (1990b). Organizational Justice: The Sound Investment in Organization, European Journal of Economic, Finance and Administrative Sciences ISSN 1450-2275.
Gist, M. E. (1987). Self-efficacy: Implication for Organizational Behavior and Human Resourcce Management, Academy of Management Review, 12, 472-485.
Gefen, D., E. Karahanna & Straub, D. W. (2003). Trust and TAM in Online Shopping: An Integrated Model, MIS Quarterly, 27(1), 51-90.
Fornell, C., & Larcker, D. F. (1981). Evaluating Structure Equation Models with Unobervable Variables and Measurment Error. Jounal of Marketing Research, 18(February), 39-50.
Folger, R. & Konovsky, M. A.(1989), “Effects of Procedural and Distributive Justice on Reactions to Pay Raise Decisions”, Academy of Management Journal, 32, 115-130
D’Arcy, J., A. Hovav, & Galletta, D. (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach, Information Systems Research, 20(1), 79-98.
Dhillon, G. & Backhouse, J. (2000). Information Systems Security Management in the New Millennium., Communications of the ACM, 43(7), 125-128.
Davis, W. D., Carson, D. M, Ammeter, A. P. & Tready, D. C. (2005). The interactive effects of goal orientation and feedback specificity on task performance, Human Performance, 18(4), 409-426.
Compeau, D. R. & Higgins, C. A. (1995). Computer Self-Efficacy: Development of a Measure end Initial Test, MIS Quarterly, 19(2), 189-211.
Colquit,. J. A. (2001). On the Dimensionality of Organizational Justice: A Construct Validation of a Measure, Journal of Applied Psychology, 30(3), 386-400.
Bollen, K. A. (1989). Structural Equation with Latent Variables, NY; Wiley.
Besnard, D. & Arief, B. (2004). Computer Security Impaired by Legitimate Users, Computers & Security, 23(3), 253-264..
Baron, R. M. & Kenny, D. A. (1986). The Moderator-Mediator Variable Distinction in Social Psychological Reasearch: Conceptua, Strategic, and Statistical Considerations, Journal of Personality and Social Psychology, 51(6), 1173-1182.
Anderson, J. C. & Gerbing, D. W. (1992). Assumptions and Comparative Strengths of the two-step Approach, Social Methods and Research, 20(3), 74-94.
Anderson, D. L. & Agarwal, R. (2010). Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions, MIS Quarterly, 34(30), 613-643.
Adams. J. S. (1965). Inequity in social exchange, In L. Bekowitz(Ed.), Advanced in experimental social psychology, 2. New York: Academic Press. 267-299.
?국가정보포럼. 국가정보학
서울: 박영사, 385[2006]
'
산업보안정책 준수의지 결정요인 연구 : 조직공정성 조절효과 觀點 = Research on the determinants that influence the willingness to comply with the industrial security policy: Focusing on the moderating effects of organizational Justice'
의 유사주제(
) 논문