“처벌과 윤리교육이 정보보안준수에 미치는 영향: 조직유형의 조절효과를 중심으로”

논문상세정보

' “처벌과 윤리교육이 정보보안준수에 미치는 영향: 조직유형의 조절효과를 중심으로”' 의 참고문헌

  • 체계적인 보안 정책 관리를 위한 계층적 보안 모델 설계
    황윤철 컴퓨터 정보통신 연구 9 1 21-32 [2001]
  • 정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로
    김종기 정보시스템연구 15 1 145-168 [2006]
  • 인터넷 정보보안 기술에 관한 연구
    하영길 상업기술연구 13 176-187 [2004]
  • 센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석
    이명진 정보처리학회논문지C 14 3 229-238 [2007]
  • 대기업병의 증세와 진단
    홍재영 - [1986]
  • 대기업병과 치유방안에 관한 연구
    문태영 [1996]
  • 대기업병: 그 실체와 치유방안
    윤순봉 - [1994]
  • The social side of sanctions: Personal and social norms as moderators of deterrence
    Wenzel, M. Law and Human Behavior 28 547-567 [2004]
  • The insider threat of information systems and the effectiveness of ISO17799
    Theoharidou, M. Computers and Security 24 472-484 [2005]
  • The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
    Harrington, S. J. MIS Quarterly 20 257-278 [1996]
  • The economics of immediate gratification
    O’Donoghue, T. Journal of Behavioral Decision Making 13 233-250 [2000]
  • The 9 to 5 underground: Are you policing computer crimes?
    Hoffer, J. A. Sloan Management Review 30 35-43 [1989]
  • Software piracy in the workplace: A model and empirical test
    Peace, A. Journal of Management Information Systems 20 153-177 [2003]
  • Softlifting: A model of motivating factors
    Simpson, P. M. Journal of Business Ethics 13 431-438 [1994]
  • Sociology of law
    Aubert, V. - [1969]
  • Social learning and deviant behavior: A specific test of a general theory
    Akers, R. L. American Sociological Review 44 636-655 [1979]
  • Punishment and Ethics Deterrents: A Study of Insider Security Contravention
    Workman, M. Journal of the American Society for Information Science and Technology 58 2 212-222 [2006]
  • Public and Private in Social life
    Benn, S. I. - [1983]
  • Organizational structure and corporate performance
    Weir, C. Management Decision 33 24-32 [1995]
  • Organizational Culture and Leadership
    Schein, E. H. - [1985]
  • Organization Theory: Structure, Design and Applications, Third Edition
    Robbins, S. P. - [1990]
  • Markets and Hierarchies : Analysis and antitrust implications
  • From intentions to actions: A theory of planned behavior. in: From cognition to behavior Action-control
    Ajzen, I. - [1985]
  • Factors affecting softlifing intention of computing students: An empirical study
    Rahim, M. M. D. Journal of Educational Computing Research 24 385-405 [2001]
  • Ethics in information technology and software use
    Calluzzo, V. J. Journal of Business Ethics 52 301-312 [2004]
  • Ethical intentions and the theories of reasoned action and planned behavior
    Kurland, N. B. Journal of Applied Social Psychology 25 297-313 [1995]
  • Enforcement policy and corporate misconduct: The changing perspective of deterrence theory
    Scholtz, J. T. Law and Contemporary Problems 60 253-268 [1997]
  • Effective IS security: An empirical study
    Straub, D. W. Information Systems Research 1 255-276 [1990]
  • Discovering and disciplining computer abuse in organizations: A field study
    Straub, D. W. MIS Quarterly 14 45-60 [1990]
  • Developing senses of law and legal justice. in: Law, justice, and the individual in society: Psychological and legal issues
    Tapp, J. L. - [1977]
  • Coping with systems risk: Security planning models for management decision-making
    Straub, D. W. MIS Quarterly 22 441-469 [1998]
  • Assessment in the learning organization: Shifting the paradigm
    Costa, A. L. - [1997]
  • An investigation of volitional control in information ethics
    Hsu, M. H. Behavior and Information Technology 22 53-62 [2003]
  • An Integrative Study of Information Systems Security Effectiveness
    Kankanhalli. A International Journal of Information Management 23 139-154 [2003]
  • All Organizations are Public: Comparing Public and Private Organizations
    Bozeman, B. - [1987]
  • A test of a person-Issue contingent model of ethical decision making in organizations
    Harrington, S. J. Journal of Business Ethics 16 363-375 [1997]
  • A holistic model of computer abuse within organizations
    Lee, J. Information Management and Computer Security 10 57-63 [2002]