정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로

논문상세정보
' 정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • Meta-Analysis
  • Policy Compliance
  • Security Policy
  • TSSEM
  • Theory of Planned Behavior
  • 계획된 행동이론
  • 메타분석
  • 보안정책
  • 정책준수
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
2,866 0

0.0%

' 정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로' 의 참고문헌

  • 음악 중재 프로그램이 ADHD 아동에 미치는 효과에 대한 융복합 연구 -체계적 문헌고찰 및 메타분석-
    조미란 [2019]
  • 국내 플립러닝의 학습효과에 관한 메타분석
    조보람 [2018]
  • 계획된 행동이론을 적용한 사회인지적 행동 모델의 유용성에 대한 메타분석
    손영곤 [2012]
  • metaSEM : An R Package for Meta-Analysis using Structural Equation Modeling
  • Variables Influencing Information Security Policy Compliance : A Systematic Review of Quantitative Studies
  • Understanding Nonmalicious Security Violations in the Workplace : A Composite Behavior Model
    K. Guo [2011]
  • Toward a Unified Model of Information Security Policy Compliance
    G. D. Moody [2018]
  • The theory of planned behavior
    I. Ajzen. [1991]
  • The Theory of Planned Behaviour : Reactions and Reflections
    I. Ajzen. [2011]
  • The Theory of Planned Behavior and Knowledge Sharing : A Systematic Review and Meta-Analytic Structural Equation Modelling
  • The Insider Threat to Organizational Information Security: A Structural Model and Empirical Test
    T. M. Dugo. [2007]
  • TPM 활동요인이 기업성과에 미치는 영향에 대한 메타분석
    연경화 [2018]
  • Systematic Review and Meta-Analysis of IS Security Policy Compliance Research. First Steps Towards Evidence-Based Structuring of the IS Security Domain
  • Software Piracy in the Workplace : A Model and Empirical Test
    A. G. Peace [2003]
  • Self-efficacy : toward a unifying theory of behavioral change
    A. Bandura [1977]
  • Seeing the Forest and the Trees : A Meta-Analysis of the Antecedents to Information Security Policy Compliance
    W. A. Cram [2019]
  • Security-Related Behavior in Using Information Systems in the Workplace : A Review and Synthesis
    K. H. Guo. [2013]
  • Review of IS Security Policy Compliance : Toward the Building Blocks of an IS Security Theory
    P. Balozian [2017]
  • Personality, attitudes, and intentions : Predicting initial adoption of information security behavior
  • Organizational Information Security Policies : A Review and Research Framework
    W. A. Cram [2017]
  • Meta-analytic Structural Equation Modelling
    S. Jak. [2015]
  • Meta-Analytic Structural Equation Modeling : A Two-Stage Approach
  • Meta-Analysis Using R
    S. Hwang. [2015]
  • Information Security Culture-State-of-the-Art Review between 2000 and 2013
    F. Karlsson [2015]
  • Information Security Awareness and Behavior : A Theory-based Literature Review
    B. Lebek [2014]
  • How Well Does the Theory of Planned Behaviour Predict Alcohol Consumption? A Systematic Review and Meta-Analysis
    R. Cooke [2016]
  • How Effective are Behavior Change Interventions Based on the Theory of Planned Behavior? : A Three-Level Meta-Analysis
  • Explaining the misuse of information systems resources in the workplace : A dual-process approach
    A. M. Chu [2015]
  • Evaluating Multilevel Models in Cross-Cultural Research : An Illustration with Social Axioms
    M. W. L. [2006]
  • Efficacy of the theory of planned behaviour : A meta‐analytic review
  • Efficacy of the Theory of Planned Behavior in Predicting Breastfeeding : Meta-Analysis and Structural Equation Modeling
    J. L. Guo [2016]
  • Determinants of Sustainable Food Consumption : A Meta-Analysis Using a Traditional and a Structural Equation Modelling Approach
    Y. Han [2012]
  • Cognitive-Affective Drivers of Employees’ Daily Compliance with Information Security Policies : A Multilevel, Longitudinal Study
  • Beyond Deterrence : An Expanded View of Employee Computer Abuse
    R. Willison [2013]
  • Belief, attitude, intention and behavior: An introduction to theory and research
    M. Fishbein [1975]
  • An Introduction to Information Security
    M. Nieles [2017]
  • Alleviating Insider Threats : Mitigation Strategies and Detection Techniques
  • Action control from Cognition to Behavior
    I. Ajzen. [1985]
  • A comparison of three models of attitude–behavior relationships in the studying behavior domain
    L. Leone [1999]
  • A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance
  • A Meta-Analysis of Mobile Commerce Adoption and the Moderating Effect of Culture
    L. Zhang [2012]