'
사이버위협 정보공유 시스템 확산에 영향을 미치는 핵심요인에 관한 연구 = A Study on the Key Factors Affecting the Diffusion of Cybersecurity Threat Information Sharing System' 의 주제별 논문영향력
논문영향력 요약
주제
컴퓨터 프로그래밍,프로그램,자료
동일주제 총논문수
논문피인용 총횟수
주제별 논문영향력의 평균
970
0
0.0%
주제별 논문영향력
논문영향력
주제
주제별 논문수
주제별 피인용횟수
주제별 논문영향력
주제분류(KDC/DDC)
컴퓨터 프로그래밍,프로그램,자 ...
970
0
0.0%
계
970
0
0.0%
* 다른 주제어 보유 논문에서 피인용된 횟수
0
'
사이버위협 정보공유 시스템 확산에 영향을 미치는 핵심요인에 관한 연구 = A Study on the Key Factors Affecting the Diffusion of Cybersecurity Threat Information Sharing System' 의 참고문헌
Zhu, K., Kraemer, K. L., X. Sean. “A Cross-Country Study of Electronic Business Adoption Using the Technology-Organization- Environment Framework”. Proceedings of the 23rd International Conference of Information Systems, Barcelona, 336-348, 2002.
Zhu, K., Kraemer, K. L. “Post-Adoption Variations in Usage and Value of e-Business by Organizations : Cross-country Evidence from the Retail Industry”. Information Systems Research, 16(1), 61-84, 2005.
Zhu, K., K. L. Kraemer, S. Xu. “The Process of Innovation Assimilation by Firms in Different Countries : A Technology Diffusion Perspective on E-Business”. Management Science, 52(10), 1557-1576, 2006.10.
Zhou, T., Y. Lu, B. Wang. “Integrating TTF and UTAUT to Explain Mobile Banking User Adoption”. Computers in Human Behavior, 26(4), 760-767, 2010.
Yu, C. S. “Factors Affection Individuals to adopt Mobile Banking”. Journal of Electronic Commerce Research, 13(2), 104-121, 2012.
Yoon, T. E., George, J. F. “Why aren’t organizations adopting virtual worlds?”. Computers in Human Behaviors, 29, 772-790, 2013.
Wang, H., H. Yang. “The Role of Personality Traits in UTAUT Model under Online Stocking”. Contemporary Management Research, 1(1), 69-82, 2005.
Vong, S., Zo, H., Ciganek, A. P. “Knowledge Sharing in the Public Sector : Empirical evidence from Cambodia”. Information Development, 1-15, 2014.10.
Venkatesh, V., Morris, M. G., Davis, G. B., Davis, F. D. “User Acceptance of Information Technology : Toward a unified View”. Information Management, 27(3), 425-478, 2003.
Tornatzky, L. G., Fleischer, M. “The Processes of Technological Innovation”. Lexington Books, Lexington, MA, 1990.
Thompson, R. L., Higgins, C. A., Howell, J. M. “Personal Computing : Toward a Conceptual Model of Utilization”. MIS Quarterly, 15(1), 125-142, 1991.
Taylor, S., P. Todd. “Understanding Information Technology Usage : A Test of Computing Models”. Information System Research, 6(2), 144-176, 1995.
Tarofder, A. K., Marthandan, G., Haque, A. “Critical Factors for Diffusion of Web Technologies for Supply Chain Management Functions : Malaysian perspective”. European Journal of Social Science, 12(3), 490-505, 2010.
TAXII. https://www.taxiiproject.github.io/
Sean Bamum. “Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIXTM)”. MITRE Corporation, 2014.2.20.
Schniederjans, D., Yadav, S. “Successful ERP Implementation : An integrative model”. Business Process Management Journal, 19(2), 364-398, 2013.
Schneiderman, R. “For Cloud Computing, the Sky is the Limit”. IEEE, 28(1), 15-144, 2011.
STIX. https://www.stixproject.github.io/
Rogers, E. M. “Diffusion of Innovation”. Free Press, 1995(4th ed). Ruivo, P., Oliveira, T., Neto, M. “Examine ERP post-Implementation stages of Use and Value : Empirical evidence from Portuguese SMEs”. International Journal of Accounting Information System, 15(2), 166-184, 2014.
Oliveira, T., Thomas, M., Espadanal, M. “Assessing the Determinants of Cloud Computing Adoption : An Analysis of the Manufacturing and Services Sectors”. Information & Management, 51, 497-510, 2014.
Oliveira, T., Martins, M. F. “Literature Review of Information Technology Adoption Models at Firm Level”. The Electronic Journal of Information Systems, 14(1), 110-121, 2011.
Muth n, B., Kaplan, D. “A Comparison of Some Methodologies for the Factor Analysis of non-normal Likert Variables”. British Journal of Mathematical and Statistical Psychology, 38(2), 171-189, 1985.
Mulaik, S. A., James, L. R., Van Alstine, J., Bennet, N., Lind, S., Stilwell, C. D. “Evaluation of Goodness-of-Fit Indices for Structural Equation Models”. Psychological Bulletin, 105(3), 430-445, 1989.
Moore, G. C., I. Benbasat. “Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation”. Information Systems Research, 2(3), 192-222, 1991.
Marl e Bijker, Mike Hart, “Factors Influencing Pervasiveness of Organizational Business Intelligence”. BUSTECH 2013 : International Conference on Business Intelligence and Technology, 2013.
Lin, H. F. “Understanding the Determinants of Electronic Supply Chain Management System Adoption : Using the Technology- Organization–Environment Framework”. Technological Forecasting & Social Change, 80-92, 2014.
Lim, J. S., Oh, J. I. “The relationship between Three Contexts and Intention of Using in the Cloud Computing Environment : A PLS Path Model Approach”. International Information Institute, 15(12), 6239-6254, 2012.
Lancaster, S., Yen, D.C., Ku, C. Y. “E-Supply Chain Management : an Evaluation of Current Web Initiatives”. Information Management & Computer Security, 14(2), 167-184, 2006.
Kynetix Technology Group. “Cloud Computing : A Strategy Guide for Board Level Executive”. Kynetix Management Guide, 2009.
Kuan, K. K. Y., Chau, P. Y. K. “A Perception-Based Model for EDI Adoption in Small Businesses using a Technology-Organization –Environment Framework”. Information and Management, 38(8), 507-521, 2001.
Kim, W., S. D. Kim, E. S. Lee, S. Y. Lee. “Adoption Issues for Cloud Computing”. Proceeding iiWAS 2009 Proceedings of the 11th International Conference on Information Integration and Web-based Applications and Services, 2009.
Kernaghan, K., Gunraj, J. “Integrating Information Technology into Public Administration : Conceptual and Practical Considerations”. Canadian Public Administration, 47(4), 525-546, 2004.12.
Joreskog, K. G., Sorbom, D. “LISREL VI : Analysis of Linear Structural Relationships by the Method of Maximum Likelihood”. Chicago : National Educational Resources, 1984.
Janet Napolitano. “A New Challenge for Our Age : Securing America Against the Threat of Cyber Attack”. Department of Homeland Security, 2009.10.20.
James, L. R., S. A. Mulaik, J. M. Brett. “Casual Analysis : Assumptions, Models, and Data”, Beverly Hills: Sage, 1982.
JPCERT/CC. https://www.jpcert.or.jp/, 2017.3.
Im, I., Hong, S., Kang, M. S. “An International Comparison of Technology Adoption Testing the UTAUT Model”. Information and Management, 48, 1-8, 2011.
Iacovou, C. L., Benbasat, I., Dexter, A. A. “Electronic Data Interchange and Small Organizations : Adoption and Impact of Technology”. MIS Quarterly, 19(4), 465-485, 1995.12.
IPA J-CSIP. http://www.ipa.go.jp, 2017.3.
Hiroshi Kawaguch. “Cybersecurity Strategy in Japan”. Japan Security Operation Center, 2015.1.
Hair, J. F. Jr., Anderson, R. E., Tatham, R. L., Black, W. C. “Multivariate data analysis”. 5, Upper Saddle River, New Jersey : Prentice Hall, 1998.
Fuksa, M. “Mobile Technologies and Services Development Impact on Mobile Internet Usage in Latvia”. Procedia Computer Science, 26, 41-50, 2013.
Fornell, C., Larcker, D. F. “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error”. Journal of Marketing Research, 18(1), 39-50, 1981.
Fishbein, M., I. Ajzen. “Belief, Attitude, Intention and Behavior : An Introduction to Theory and Research”, Addison-Wesley, Reading, MA, 1975.
FS-ISAC. https://www.fsisac.com, 2017.3.
ENISA. “Cybersecurity Strategy of the European Union : An Open, Safe and Secure Cyberspace”. 2013.
Denise E. Zheng, James A. Lewis. “Cyber Threat Information Sharing - Recommendations for Congress and the Administration”. A Report of the CSIS Strategic Technologies Program, 2015.3.
Davis, F. D., Bagozzi, R. P., Warshaw, P. R. “User Acceptance of Computer Technology : A Comparison of Two Theoretical Models”. Management Science, 35(8), 982-1003, 1989.
Davis, F. D., Bagozzi, R. P., Warshaw, P. R. “Extrinsic and Intrinsic Motivation to Use Computers in the Workplace”. Journal of Applied Social Psychology, 22(14), 1111-1132, 1992.
Davis, F. D. “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology”. MIS Quarterly, 13(3), 319-340, 1989.9.
Dasgupta, S. “Supporting Ideas with Data”. Economic and Political Weekly, 34(50), 3513-3515, 1999.
DHS. “National Infrastructure Protection Plan (NIPP) 2013 : Partnering for Critical Infrastructure Security and Resilience”. https://www.dhs.gov/publication/nipp-2013.
DHS. “Cybersecurity Information Sharing Act of 2015”. 2015.12.
DHS. “Cyber Information Sharing and Collaboration Program (CISCP)”. https://www.dhs.gov/ciscp, 2017.3.
Compeau, D. R., C. A. Higgins. “Computer Self-Efficacy : Development of a Measure and Initial Test”. MIS Quarterly, 19(2), 189-211, 1995.
Chris Johnson, Lee Badger, David Waltermire. “Guide to Cyber Threat Information Sharing”. NIST Special Publication 800-150, 2014.10.
Chen, L., C. J. Kuan, Y. Lee, H. L. Huang. “Applicability of the UTAUT Model in Playing Online Game through Mobile Phones : Moderating Effects of User Experience”. IEEE International Technology Management Conference, 625-629, 2011.
Chau, Patrick, Y. K., Hui, K. L. “Determinants of Small Business EDI Adoption : An empirical Investigation”. Journal of Organization Computing and Electronic Commerce, 11(4), 229-252, 2001.
Chan, F. T. S., Chong, A. Y. L., Zhou, L. “An Empirical Investigation of Factors Affecting e-Collaboration Diffusion in SMEs”. International Journal of Production Economics, 138(2), 329-344, 2012.
Carmines, E. G., McIver, J. P. “Analyzing Models with Unobserved Variables : Analysis of Covariance Structures”. In George W. Bohrnstedt and Edgar F. Borgatta, eds. Social Measurement : Current Issues. Beverly Hills, Sage Publications, 65-115, 1981.
CERT-UK. “Cyber Security Information Sharing Partners Terms and Conditions”. 2013.8.
CERT-UK. https://www.cert.gov.uk/, 2017.3.
Browne, M. W., Michael, W., Cudeck, R. “Alternative Ways of Assessing Model Fit”. Sociological Methods & Research, 230-258, 1993.
Boni Pudjianto, Zo Hangjung. “Factors Affecting e-Government Assimilation in Developing Countries”. 4th Communication Policy Research, South Conference, 2009.
Bishop, M. “Computer Security: Art and Science”. Addison-Wesley, Boston, 2003.
Bentler, P. M., Bonett, D. G. “Significance Tests and Goodness of Fit in the Analysis of Covariance Structures”. Psychological Bulletin, 88, 588-606, 1980.
Bentler, P. M. “Comparative Fit Indexes in Structural Models”. Psychological Bulletin, 107(2), 238-246, 1990.
Anderson, J. C., Gerbing, D. W. “Structural equation modeling in practice : A review and recommended two-step approach”. Psychological Bulletin, 103(3), 411-423, 1998.
Ajzen, I. “The theory of planned behavior”. Organizational Behavior and Human Decision Processes, 50(2), 179-211, 1991.
Abushanab, E., J. M. Pearson. “Internet Banking in Jordan : The Unified Theory of Acceptance and Use of Technology(UTAUT) Perspective”. Journal of Systems and Information Technology, 9(1), 78-97, 2007.
'
사이버위협 정보공유 시스템 확산에 영향을 미치는 핵심요인에 관한 연구 = A Study on the Key Factors Affecting the Diffusion of Cybersecurity Threat Information Sharing System'
의 유사주제(
) 논문