박사

은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구 = A Study on the Information Security Measures Influencing Information Security Policy Compliance Intention of IT Personnel of Banks

심준보 2015년
논문상세정보
' 은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구 = A Study on the Information Security Measures Influencing Information Security Policy Compliance Intention of IT Personnel of Banks' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 은행 it인력
  • 정보보호
  • 정보보호 대책
  • 정보보호 준수 의도
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
205 0

0.0%

' 은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구 = A Study on the Information Security Measures Influencing Information Security Policy Compliance Intention of IT Personnel of Banks' 의 참고문헌

  • 지나치게 성별 차이를 강조하면 문제가 될 수있 다
    Gendered Innovation , 년 5월 1일에 접근 [2015]
  • 조직 구성원들의 정보보안 정책 준수에 영향을 미치는 요인에 관한 연구 -금융서비스업을 중심으로-
    임명성 서비스경영학회지, Vol. 14, No.1, 년, pp. 143-171 [2013]
  • 정보보안 정책 준수 의도에 대한 영향요인
    김상훈(Sang-Hoon Kim) 박선영 한국전자거래학 회지, Vol. 16, No. 4, 년 11월, pp 33-51 [2011]
  • 정보 보안,
    전태일 http://ko.wikipedia.org/w/index.php?title=%EC%A0%95%EB%B3%B4_%EB%B3%B4%EC%95%88&oldid=13061197, 년 2월 1일에 접근 [2015]
  • 보안뉴스, “개정 전자금융거래법! 꼭 체크해야 할 8개 보안조항”, 보안뉴스
    년 12월 9일 [2014]
  • 교육과학기술부
    정보보안 모범사례 가이드, 년 12월 [2011]
  • “항만지업 종사자들의 정보보안인식과 지각된 정보보안위험에 영향을 미치는 요인”
    강다연 장명희 한국항해항만학회지, Vol. 36, No. 3,년, pp. 261-271 [2012]
  • “조직 구성원들이 정보보안 준수 동기요인에 관한 연구”
    김상현 송영미 e- 비즈니스 연구, Vol. 12, No. 5, 년, pp. 327-349 [2011]
  • “조직 구성원들의 정책 준수행위 의도에 관한 연구”
    임명성 디지털정책연구, Vol. 10, No. 10, 년, pp. 119-228 [2012]
  • “정보보안 정책의 채택이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구”
    임명성 디지털 정책 연구, Vol. 11, No.1, 년, pp.27-38 [2013]
  • “보안 대책이 지속적 보안 정책 준수에 미치는 영향”
    박철주 임명성 디지털정책연구, Vol. 10, No. 4, 년 5월, pp 23-35 [2012]
  • “금융전산 보안 강화 종합대책”
    금융위원회 전자금융과, 금융감독원 IT감독국 [2013]
  • Yildirima, E.Y., G. Akalpa, S. Aytacb, and N. Bayramb, “FactorsInfluencing Information Security Management in Small- andMedium-sized Enterprises: A Case Study from Turkey“,International Journal of Information Management, Vol. 31, 2011,pp. 360?365.
  • Workman, M., W.H. Bommer and D. Straub, “Security Lapsesand the Omission of Information Security Measures: A ThreatControl Model and Empirical Test”, Computers in HumanBehavior, Vol. 24, 2008, pp. 2799?2816.
  • Wong, W. I., and Hines, M., "Preferences for Pink and Blue: TheDevelopment of Color Preferences as a Distinct Gender-TypedBehavior in Toddlers", Archives of Sexual Behavior, 2015, pp.1-12.
  • Wenzel, M., "The Social Side of Sanctions: Personal and SocialNorms as Moderators of Deterrence", Law and Human Behavior,Vol. 28, No. 5, 2004, pp. 547.
  • Vroom, C., and Solms, R. von, “Towards Information SecurityBehavioural Compliance”, Computers & Security, Vol. 23, No. 3,2004, pp. 191-198.
  • Vance, A., and Siponen, M. T., "IS Security Policy Violations: ARational Choice Perspective", Journal of Organizational and EndUser Computing (JOEUC), Vol. 24. No. 1, 2012, pp. 21-41.
  • Vance, A., Siponen, M., and Pahnila, S., "Motivating IS SecurityCompliance: Insights From Habit and Protection MotivationTheory", Information and Management, Vol. 49, No. 3, 2012, pp.190-198.
  • Tsohou, A., M. Karyda, S. Kokolakis, and E. Kiountouzis,"Analyzing Trajectories of Information Security Awareness",Information Technology & People, Vol. 25, No. 3, 2012, pp.327-352.
  • Tomarken, A. J., and Waller, N. G., "Structural EquationModeling: Strengths, Limitations, and Misconceptions", Annu.Rev. Clin. Psychol., Vol. 1, 2005, pp. 31-65.
  • Tariq, M.A., J. Brynielsson, and H. Artman, “The SecurityAwareness Paradox: A Case Study”, 2014 IEEE/ACM InternationalConference on Advances in Social Networks Analysis and Mining(ASONAM 2014), 2014, pp. 704-711.
  • Straub, D., “Effective IS Security: An Empirical Study”,Information Systems Research, Vol, 1, No. 3, 1990. pp. 255-276.
  • Steel, R. P., "Turnover Theory at the Empirical Interface:Problems of Fit and Functions", Academy of ManagementReview, Vol. 27, No. 3, 2002, pp. 346-360.
  • Srinivasan, S. "Information Security Policies and Controls for aTrusted Environment." Information Systems Control Journal, No. 2, 2008.
  • Spears, J. L., and Barki, H., "User Participation in InformationSystems Security Risk Management,” MIS Quarterly,Vol. 34, No. 3, 2010, pp. 503-522.
  • Son, J. Y., "Out of Fear or Desire? Toward a BetterUnderstanding of Employees’ Motivation to Follow IS SecurityPolicies". Information and Management, Vol. 48, No. 7, 2011, pp. 296-302.
  • Solms, R., "Information security management (3): the Code ofPractice for Information Security Management (BS 7799)",Information Management & Computer Security, Vol. 6, No. 5,1998, pp. 224?225.
  • Siponen, M.T., "A Conceptual Foundation for OrganizationalInformation Security Awareness", Information Management &Computer Security, Vol. 8, No. 1, 2000, pp. 31?41.
  • Siponen, M., Vance, A., and Willison, R., "New Insights into theProblem of Software Piracy: The Effects of Neutralization,Shame, and Moral Beliefs", Information & Management, Vol. 49,No. 7, 2012, pp. 334-341.
  • Sari, P.K. and N. Trianasari, “Information Security AwarenessMeasurement with Confirmatory Factor Analysis”, 2014International Symposium on Technology Management andEmerging Technologies (ISTMET 2014), 2014, pp. 218-223.
  • Sandhu, R. S., & Samarati, P., "Access Control: Principle andPractice", Communications Magazine, IEEE, Vol. 32, No. 9, 1994,pp. 40-48.
  • Rosemann, M. and I. Vessey, “Toward Improving the Relevanceof Information Systems Research to Practice: The Role ofApplicability Checks”, MIS Quarterly, Vol. 32, No. 1, 2008, pp.1-22.
  • Richardson, R., "CSI Computer Crime and Security Survey".Computer Security Institute, Vol 1, 2008, pp. 1-30.
  • Ransbotham, S., and Mitra, S., "Choice and Chance: AConceptual Model of Paths to Information Security Compromise",Information Systems Research, Vol. 20, No. 1, 2009, pp. 121-139.
  • PricewaterhouseCoopers, "Global State of Information SecuritySurvey 2011", http://www.pwc.com/gx/en/informationsecurity-survey/ pdf/giss-2011-survey-report.pdf, July 25, 2012.
  • Pogarsky, G., & Piquero, A. R., "Studying the Reach ofDeterrence: Can Deterrence Theory Help Explain PoliceMisconduct?. Journal of Criminal Justice, Vol. 32, No. 4, 2004,pp. 371-386.
  • Peace, A. G., Galletta, D. F., and Thong, J. Y. L., “SoftwarePiracy in the Workplace: A Model and Empirical Test”, Journalof Management Information Systems, Vol. 20, No. 1, 2003. pp.153.177.
  • Pahnila, S., Siponen, M., and Mahmood, A., "Employees'Behavior Towards Is Security Policy Compliance,” Proceedings ofthe 40th Annual Hawaii International Conference on SystemSciences, 2007, pp. 156-166.
  • Nellycw, “우리나라 은행 순위 및 종류”, 년 2월 17일
    [2015]
  • Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., and Vance,A., "What Levels of Moral Reasoning and Values ExplainAdherence to Information Security Rules&Quest; An EmpiricalStudy", European Journal of Information Systems, Vol. 18, No. 2,2009, pp. 126-139.
  • Mobley, W.H., Griffeth, R. W., Han, H. H., and Meglino, B. M.,"Review and Conceptual Analysis of the Employee TurnoverProcess", Psychological Bulletin, Vol. 86, No. 3, 1979, pp.493-522.
  • Merete, J., H. Eirik and A.J. Hovden, "Implementation andEffectiveness of Organizational Information Security Measures",Information Management and Computer Security, Vol. 16, No. 4,2008, pp. 377?397.
  • Meredith, S. L., "Comparative Perspectives on Human GenderDevelopment and Evolution", American Journal of PhysicalAnthropology, Vol. 156, No. S59, 2015, pp. 72-97.
  • Lohmeyer, D. F., McCrory, J., and Pogreb, S., "ManagingInformation Security (Current Research)", The McKinseyQuarterly, 2002, p. 12.
  • Li, M., Lou, W., and Ren, K., "Data Security and Privacy inWireless Body Area Networks", Wireless Communications, IEEE,Vol. 17, No. 1, 2010, pp. 51-58.
  • Leonard, L. N. K., Cronan, T. P., and Kreie, J., “What InfluencesIT Ethical Behavior Intentions?Planned Behavior, ReasonedAction, Perceived Importance, Individual Characteristics?",Information Management, Vol. 42, No. 1, 2004, pp. 143?158.
  • Lee, S. M., Lee, S. G., and Yoo, S., "An Integrative Model ofComputer Abuse Based on Social Control and GeneralDeterrence Theories,” Information Management, Vol. 41, No. 6,2004, pp. 707-718.
  • Lee, J. and Lee, Y., "A Holistic Model of Computer Abuse WithinOrganizations,” Information Management and Computer Security,Vol. 10, No. 2, 2002, pp. 57- 63.
  • LISREL 구조방정식모델-이해와 활용
    배병렬 청람, 년 [2005]
  • Khan, S. A., Lederer, A. L., and Mirchandani, D. A., “TopManagement Support, Collective Mindfulness, and InformationSystems Performance”. Journal of International Technology andInformation Management, Vol. 22, No. 1, 2013, p. 6Lebek, B., J. Uffen, M.H. Breitner, M. Neumann, and B. Hohler,“Employees’ Information Security Awareness and Behavior: ALiterature Review”, 2013 46th Hawaii International Conference onSystem Sciences, 2013, pp. 2979-2987.
  • Khalid, S., Solimana, K.S., and Janzb, B.D., “An ExploratoryStudy to Identify the Critical Factors Affecting the Decision toEstablish Internet-based Interorganizational InformationSystems”, Information & Management, Vol. 41, 2004, pp. 697?706.
  • Ifinedo, P., “Understanding Information Systems Security PolicyCompliance: An Integration of the Theory of Planned Behaviorand the Protection Motivation Theory“, Computers & Security,Vol. 31, 2012, pp. 83-95.
  • ISO, ISO/IEC 27000:2009 Overview and Vocabulary, 2009.
  • Hu, Q., T. Dinev, P. Hart and D. Cooke, “Managing EmployeeCompliance with Information Security Policies: The Critical Roleof Top Management and Organizational Culture”, DecisionSciences, Vol. 43 No. 4, 2012, pp. 615-659.
  • Hovav, A., and J. D’Arcy, “Applying an Extended Model ofDeterrence Across Cultures: An Investigation of informationSystems Misuse in the U.S. and South Korea, Information &Management, Vol. 49, 2012, pp. 99?110.
  • Herath, T. and H.R. Rao, “Encouraging Information SecurityBehaviors in Organizations: Role of Penalties, Pressures andPerceived Effectiveness”, Decision Support Systems, Vol. 47,2009, pp. 154?165.
  • Hagen, J.M., E. Albrechtsen, and J. Hovden, "Implementationand Effectiveness of Organizational Information SecurityMeasures", Information Management & Computer Security, Vol.16, No. 4, 2008, pp. 377 ? 397.
  • Haeussinger, F.J., and J.J. Kranz, “Information SecurityAwareness: Its Antecedents and Mediating Effects on SecurityCompliant Behavior”, International Conference on InformationSystems, 2013, pp. 1-16.
  • H ansch, N. and Z. Benenson, “Specifying IT SecurityAwareness“, 25th International Workshop on Database andExpert Systems Applications, 2014, pp. 326-330.
  • Guo, K. H. "Security-related Behavior in Using InformationSystems in the Workplace: A Review and Synthesis", Computers& Security Vol. 32, 2013, pp. 242-251.
  • Gundu, T. and S.V. Flowerday, “Ignorance to Awareness:Towards an Information Security Awareness Process”, SAIEEAfrica Research Journal, Vol. 104, No. 2, 2013, pp. 69-79.
  • Goel, S, and Chengalur-Smith, I. N., "Metrics for Characterizingthe Form of Security Policies." The Journal of StrategicInformation Systems, Vol. 19, No. 4, 2010, pp. 281-295.
  • George, D., and Mallery, P., SPSS for Windows Step by Step: ASimple Guide and Reference. 11.0 update (4th ed.), 2003,Boston: Allyn & Bacon.
  • Furnell, S., and Thomson, K.-L. "From Culture to Disobedience:Recognising the Varying User Acceptance of IT Security,"Computer Fraud & Security, Vol. 2, 2009, pp. 5-10.
  • Fornell, C., and Larcker, D. F., "Structural Equation Models withUnobservable Variables and Measurement Error: Algebra andStatistics". Journal of Marketing Research, 1981, pp. 382-388.
  • Feng, T., & Zhao, G., "Top Management Support,Inter-organizational Relationships and External Involvement",Industrial Management and Data Systems, Vol. 114, No. 4, 2014,pp. 526-549.
  • D’Arcy, J., Hovav, A., and Galletta, D., "User Awareness ofSecurity Countermeasures and its Impact on InformationSystems Misuse: a Deterrence Perspective", Information SystemsResearch, Vol. 20, No. 1, 2009, pp. 79?98.
  • Doherty, N.F., Anastasakis, L., and Fulford, H., “The InformationSecurity Policy Unpacked: A Critical Study of the Content ofUniversity Policies”, International Journal of InformationManagement, Volume 29, Issue 6, December 2009, pp. 449?457.
  • Crossler, R.E., A.C. Johnston, P.B. Lowry, Q. Hud, M. Warkentin,and R. Baskerville, “Future Directions for Behavioral InformationSecurity Research”, Computers & Security, Vol. 32. 2013, pp.90-101.
  • Cheng, L., Y. Li, W. Li, E Holm, and Q. Zhai, “Understandingthe Violation of IS Security Policy in Organizations: AnIntegrated Model Based on Social Control and DeterrenceTheory, Computers & Security, Vol. 39, 2013, pp. 447-459.
  • Chang, A. J.-T., and Yeh, Q.-J., "On Security PreparationsAgainst Possible IS Threats Across Industries," InformationManagement & Computer Security, Vol. 14, No. 4, 2006, pp.343-360.
  • Chan, M., Woon I., and Kankanhalli A., "Perceptions ofInformation Security at the Workplace: Linking InformationSecurity Climate to Compliant Behavior,”" Journal of InformationPrivacy and Security, Vol. 1, No.3, 2005, pp. 18-41.
  • Cavusoglu, H., Mishra, B., and Raghunathan, S., "A Model forEvaluating IT Security Investments”, Communications of theACM, Vol. 47, No. 7, 2004, pp. 87-92.
  • CNSS, CNSSI-4014 Information Assurance Training Standard forInformation Systems Security Officers, 2010.
  • Bulgurcu, B., H. Cavusoglu, and I. Benbasat, “InformationSecurity Policy Compliance: An Empirical Study ofRationality-based Beliefs and Information Security Awareness”,MIS Quarterly Vol. 34, No. 3, 2010, pp. 523-548.
  • Browne, M. W., and Cudeck, R., "Alternative Ways of AssessingModel Fit", Sage Focus Editions, Vol. 154, 1993, pp. 136-136.
  • Brockman, B.K., and Morgan, R.M., “The Moderating Effect ofOrganizational Cohesiveness in Knowledge Use and New ProductDevelopment”, Journal of the Academy of Marketing Science,Vol. 34, No. 3, 2006, pp. 295-307.
  • Brancheau, J. C., Janz, B. D., and Wetherbe, J. C., "Key Issues inInformation Sstems Mnagement: 1994-95 SIM Delphi Results",MIS Quarterly, Vol. 20, No. 2, 1996, pp. 225-242.
  • Boss, S., Kirsch, L., Angermeier, I., Shingler, R., and Boss, R.,"If Someone Is Watching, I'll Do What I'm Asked: Mandatoriness,Control, and Information Security," European Journal ofInformation Systems, Vol. 18, No. 2, 2009, pp. 151-164.
  • Blakley, B., E. McDermott, and D. Geer, “Information Security sInformation Risk Management”, Proceedings of the 2001workshop on New security paradigms. ACM, 2001, pp. 97-104.
  • Bentler, P. M., "Comparative Fit Indexes in Structural Models",Psychological Bulletin, Vol. 107, No. 2, 1990, pp. 238-246.
  • Bauer, S., E. W.N. Bernroider, and K. Chudzikowski, “End UserInformation Security Awareness Programs for ImprovingInformation Security in Banking Organizations: PreliminaryResults from an Exploratory Study”, Proceedings of the EighthPre-ICIS Workshop on Information Security and Privacy(SIGSEC), 2013, pp. 33-49.
  • Ajzen, I., “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, 1991, pp. 179-211.
  • ?temberger, M. I., Manfreda, A., & Kova?i?, A. (2011). Achievingtop management support with business knowledge and role ofIT/IS personnel. International Journal of InformationManagement, 31(5), 428-436.