“정보보안정책 준수가 정보보안능력 및 행동에 미치는영향 분석 : 해운항만조직 구성원을 대상으로”

논문상세정보

' “정보보안정책 준수가 정보보안능력 및 행동에 미치는영향 분석 : 해운항만조직 구성원을 대상으로”' 의 참고문헌

  • 효과적인 정보보호인식제고 방안,
    임채호 정보보호학회지 16 2 30-36 [2006]
  • 해운항만조직 구성원들의 정보보안정책 준수에 영향을 미치는 요인
    강다연 한국항만경제학회지 28 1 1-23 [2012]
  • 항만물류보안관리 시스템의 체계화 및 일원화 방안
    강재영 법과정책연구 13 2 389-436 [2013]
  • 처벌과 윤리교육이 정보보안준수에 미치는 영향: 조직유형의 조절효과를 중심으로
    안중호 Information Systems Review 12 1 23-42 [2010]
  • 조직의 정보윤리실천이 구성원의 정보보안 인식과 행동에 미치는 영향에 관한 연구
    백민정 경상논총 28 4 119-145 [2010]
  • 정보보호문화의 평가지표에 관한 탐색적 연구
    이선중 정보화정책 15 3 100-119 [2008]
  • 정보보안 및 정보시스템자산 관리를 위한 내부 감시·통제시스템
    윤한성 Information Systems Review 9 1 121-137 [2007]
  • 우리나라 중소기업의 정보 보호 역량 강화를 위한 교육 훈련 현황과 문제점
    문현정 정보보호학회지 19 1 29-39 [2009]
  • 기업체의 효율적인 보안관리 모델
    노순동 산업보안논총 창간 79-101 [2004]
  • 기업의 순환계 IT System과 정보보안의 중요 이슈
    구태언 - [2011]
  • The Insider Threat to Information Systems and The Effectiveness of ISO17799
    Theoharidou, M Computers and Security 24 472-484 [2005]
  • Self-efficacy, Implications for Organizational Behavior and Human Resource Management
    Gist, M. E. Academy of Management Review 12 472-485 [1987]
  • Self-Efficacy: The Exercise of control
    Bandura.A - [1977]
  • Security Concerns of System User: A Study of Perceptions of the Adequacy of Security
    Goodhue, D Information and Management 20 1 13-27 [1991]
  • Punishment and Ethics Deterrents: A Study of Insider Security Contravention
    Workman, M. Journal of the American Society for Information Science and Technology 58 2 212-222 [2006]
  • Mergers and Acquisitions Security: Corporate Restructuring and Security Management
    Halibozek, E Burlington MA: Elsevier Butterworth-Heinemann 57 - [2005]
  • Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness. White Paper
    Knapp, K Information Systems Security Certification Consortium (ISC) 2 - [2005]
  • Knowing is doing
    Choi, N Information Management and Computer Security 16 5 484-501 [2008]
  • Information security awareness : the psychology behind the technology
    Layton, T - [2005]
  • Information Security-A Multidimensional Discipline
    Solms, B Computer and Security 20 6 504-508 [2001]
  • Information Security Policy Compliance:An Empirical Study of Rationality-Based Beliefs and Information Security Awareness
    Bulgurcu, B MIS Quarterly 34 3 523-548 [2010]
  • Information Security Control Resources in Organization: A Multidimensional View and Their Key Drivers
    Cavusoglu, H - [2009]
  • Implementing Information Security in the 21 super(st) Century-do You have the Balancing Factors?
    Nosworthy, J Computer and Security 19 4 337-347 [2000]
  • Examining the Role of Differential Association and Techniques of Neutralization in Explaining Corporate Crime
    Piquero, N. L Deviant Behavior 26 2 159-188 [2005]
  • Ethical Intentions and the Theories of Reasoned Action and Planned Behavior1
    Kurland, N Journal of Applied Social Psychology 25 4 297-313 [2006]
  • Diffusion of innovations
    Rogers EM - [1983]
  • Deterrence: The Elusive Dependent Variable
    Lebow, R World Politics:A Quarterly Journal of International Relations 42 3 336-369 [1990]
  • Coping with systems risk: security planning models for management decision making
    Straub, D MIS Quarterly 22 4 441-469 [1998]
  • An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories
    Lee, S. M Information and Management 41 6 707-718 [2004]
  • A Framework for Sustainable Port Security
    Harrald, J. R Journal of Homeland Security and Emergency Management 1 2 1-13 [2004]
  • A Cross-Cultural Investigation of Situational Information Security Awareness Programs
    Chen, C Information Management and Computer Security 16 4 360-376 [2008]
  • A Conceptual Foundation for Organization Information Security Awareness, Information
    Siponen Management and Computer Security 8 1 31-41 [2000]
  • A Cognitive Theory of Deterrence
    Berejikian, J Journal of Peace Research 39 165-183 [2002]