위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석

' 위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 전산공학
  • information seeking
  • online privacy
  • prevention behavior
  • privacyprotectionmotivation
  • risk perception attitude (rpa) framework
  • 보호동기
  • 예방활동
  • 온라인 프라이버시
  • 위험인식태도프레임웍
  • 정보탐색
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
689 0

0.0%

' 위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석' 의 참고문헌

  • 최고경영층의 정보보호 리더십에 따른 정보보호 통제활동의 차이 분석
    유진호 한국전자거래학회지 19 (1) : 63 ~ 78 [2014]
  • 정보화 사회에서의 개인정보권의침해와 그 구제
    이승길 중앙법학 11 (1) : 51 ~ 83 [2009]
  • 정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로
    지범석 품질경영학회지 39 (3) : 432 ~ 443 [2011]
  • 정보보호 전문인력의 경력에 따른 지식 및 기술 수요 특성
    유혜원 정보보호학회논문지 19 (4) : 77 ~ 89 [2009]
  • 정보보안 사고와 사고방지 관련 투자가 기업가치에 미치는 영향
    권영옥 Information Syste Review 9 (1) : 105 ~ 120 [2007]
  • 인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로
    박찬욱 인터넷정보학회논문지 15 (2) : 59 ~ 71 [2014]
  • 위험지각태도와 규범이 자궁경부암 예방행동의도에 미치는 영향에 대한 연구 -우리나라 여대생을 대상으로 한 RPA 모델 적용을 중심으로-
    조성은 홍보학연구 15 (1) : 58 ~ 98 [2011]
  • 웹서비스 환경에서의 프라이버시를 보호하는 디지털 저작권 관리 아키텍쳐
    송유진 한국전자거래학회지 10 (4) : 53 ~ 81 [2005]
  • 웹 2.0 시대의 프라이버시 : 청년 UCC 이용자들의 인식과 실천을 중심으로
    이동후 한국언론정보학보 46 (2) : 556 ~ 589 [2009]
  • 온라인 환경에서 프라이버시 행동의도에 미치는 영향: 보호동기이론을 중심으로
    김종기 정보화정책 20 (3) : 63 ~ 85 [2013]
  • 기업의 개인정보 유출로 인한 경제적 피해규모 산출방법
    한창희 한국전자거래학회지 16 (4) : 17 ~ 31 [2011]
  • 개인정보 유출이 기업의 주가에 미치는 영향
    김정연 한국전자거래학회지 18 (1) : 1 ~ 12 [2013]
  • Use of the Risk Perception Attitude Framework for Promoting Breast Cancer Prevention
    Rimal, R. N Journal of Applied Social Psychology 40 (2) : 287 ~ 310 [2010]
  • Understanding Security Behaviors in Personal Computer Usage : A Threat Avoidance Perspective
    Liang, H Journal of the Association for Information Syste 11 (7) : 394 ~ 413 [2010]
  • Tightening the Net : A Review of Current and Next Generation Spam Filtering Tools
    Carpinter, J. Computers and Security 25 : 566 ~ 578 [2006]
  • The influence of perceived risk on internet shopping behavior : A multidimensional perspective
    Crespo, A. H. Journal of Risk Research 12 (2) : 259 ~ 277 [2009]
  • The Value of Privacy Assurance : A Field Experiment
    Hui, K. L. MIS Quarterly 31 (1) : 19 ~ 34 [2009]
  • The Role of Risk, Efficacy, and Anxiety in Smokers’ Cancer Information Seeking
    Zhao, X Health Communication 24 (3) : 259 ~ 269 [2009]
  • The Role of Anxiety in Seeking and Retaining Risk Information : Testing the Risk Perception Attitude Framework in Two Studies
    Turner, M. M. Human Communication Research 32 (2) : 130 ~ 156 [2006]
  • The Present and Future of IT839 Information Security Technologies
    Youm, H. Y. KIISC Review 15 (3) : 1 ~ 12 [2005]
  • The Latest Trends and Future Prospects on Personal Information Protection Technologies
    Nam, K. KIISC Review 18 (6) : 11 ~ 19 [2008]
  • The Internet and Privacy Legislation : Cookies for a Treat?
    Mayer-Schönberger, V. Computer Law and Security Review 14 (3) : 166 ~ 174 [1998]
  • The Effect of Internet Security Breach Announcements on Market Value : Capital Market Reactions for Breached Firms and Internet Security Developers
    Cavusoglu, H. International Journal of Electronic Commerce 9 (1) : 70 ~ 104 [2004]
  • Social Foundation of Thought and Action
    Bandura, A Prentice-Hall [1986]
  • Personal Information Security Management System and Governance
    Kim, J. -D. KIISC Review 18 (6) : 1 ~ 5 [2008]
  • Perceived risk and efficacy beliefs as motivators of change: Use of the risk perception attitude(RPA) framework to understand health behaviors
    Rimal, R. N Human Communication Research 29 (3) : 370 ~ 399 [2003]
  • Perceive Risk and Self-efficacy as Motivators : Understanding Individuals’Long-term Use of Health Information
    Rimal, R. N Journal of Communication 51 (4) : 633 ~ 654 [2001]
  • Online Detection and Prevention of Phishing Attacks
    Chen, J. IEEE Communication and Networking, China Com’06 : 1 ~ 7 [2006]
  • Multivariate data analysis with readings
    Hair, J. F. Prentice Hall [2006]
  • Measuring service quality: A reexamination and extension
    Cronin, J. J. Journal of Marketing 56 (3) : 55 ~ 67 [1992]
  • Market Orientation, Service Quality and Business Profitability : A Conceptual Model And Empirical Evidence
    Chang, T.-Z. Journal of Services Marketing 12 (6) : 246 ~ 254 [1998]
  • Is Usage a Missing Link in Explaining the Perceived Learning Outcome of Technology-Mediated Learning
    Soh, P.-H. IEEE Transactions on Engineering Management 55 (1) : 50 ~ 66 [2008]
  • Information Seeking and Workplace Safety : A Field Application of the Risk Perception Attitude Framework
    Real, K. Journal of Applied Communication Research 36 (3) : 339 ~ 359 [2008]
  • Information Privacy : Management, Marketplace, and Legal Challenges
    Chan, Y. E. Communications of the Association for Information Syste 16 (12) : 270 ~ 298 [2005]
  • From Information Privacy to Identity Privacy Reconsidering the Concept of Network Privacy
    Woo, J. Press and Society 13 (4) : 110 ~ 145 [2005]
  • Finding and Theory in the Study of Fear Communications
    Leventhal, H. I. Advances in Experimental Social Psychology 5 : 119 ~ 186 [1971]
  • Fear Control and Danger Control : A Test of the Extended Parallel Process Model(EPPM)
    Witte, K. Communication Monographs 61 (2) : 113 ~ 134 [1994]
  • Fear Appeals and Information Security Behaviors: An Empirical Study
    Johnston, A. C. MIS Quarterly 34 (3) : 549 ~ 566 [2010]
  • Extending the TAM for a World-Wide-Web Context
    Moon, J.-W Information and Management 38 (4) : 217 ~ 230 [2001]
  • Extending the Purview of the Risk Perception Attitude Framework : Findings from HIV/AIDS Prevention Research in Malawi
    Rimal, R. N Health Communication 24 (3) : 210 ~ 218 [2009]
  • Customer Self-Efficacy in Technology Based Self-Service
    Beuningen, J. V. Journal of Service Research 11 (4) : 407 ~ 428 [2009]
  • Current Status of Domestic and Foreign Personal Information Breach Notification Act
    Byun, S. -J. KIISC Review 18 (6) : 35 ~ 42 [2008]
  • Coping Strategy for Environment Changes in Personal Information Protection Regulations due to Personal Information Protection Law Enforcement
    Yun, S. -Y. Korea Information Processing Society Review 17 (2) : 3 ~ 9 [2010]
  • Control and Assurance in E-Commerce:Privacy, Integrity, and Security at eBay
    Duh, R. -R. Taiwan Accounting Review 3 (1) : 1 ~ 27 [2002]
  • Compliance with Information Security Policies : An Empirical Investigation
    Siponen, M. Computer 43 (2) : 64 ~ 71 [2010]
  • An empirical investigation of KM styles and their effect on corporate performance
    Choi, B Information and Management 40 (3) : 403 ~ 417 [2003]
  • An International Trend in Online Individual Information Protection-Focusing on American System-
    Moon, S. Journal of Comparative Law 3 : 57 ~ 81 [2004]
  • An Empirical Study on SNS Users’ Privacy Protection Behaviors
    Park, H.-S Management and Economics 46 (2) : 69 ~ 91
  • A protection motivation theory of fear appeals and attitude change
    Rogers, R. W The Journal of Psychology 91 (1) : 93 ~ 114 [1975]
  • 2013Survey on the Internet Usage Executive Summary