연구동향 분석
홈
알림
이용안내
오류접수
API
서비스소개
인기 연구 키워드 :
인기 활용 키워드 :
정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구
임명성
2013년
활용도 Analysis
논문 Analysis
연구자 Analysis
활용도 Analysis
논문 Analysis
연구자 Analysis
활용도
공유도
영향력
논문상세정보
저자
임명성
제어번호
99574748
학술지명
디지털융복합연구
권호사항
Vol. 11 No. 1 [ 2013 ]
발행처
한국디지털정책학회
발행처 URL
http://www.policy.or.kr
자료유형
학술저널
수록면
27-38 ( 12쪽)
언어
Korean
출판년도
2013
KDC
569
등재정보
KCI등재
판매처
학술교육원
참고문헌( 41)
유사주제 논문( 798)
공익사업 798건
인용/피인용
정보보안정책의 특성이 구성원들의 보안정책 준수 행 ...
' 정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구' 의 주제별 논문영향력
논문영향력 요약
주제
공익사업
동일주제 총논문수
논문피인용 총횟수
주제별 논문영향력의 평균
799
4
0.0%
자세히
주제별 논문영향력
논문영향력
주제
주제별 논문수
주제별 피인용횟수
주제별 논문영향력
주제분류(KDC/DDC)
공익사업
799
0
0.0%
계
799
0
0.0%
* 다른 주제어 보유 논문에서 피인용된 횟수
4
닫기
' 정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구'
의 참고문헌
Why Users (Fail to) Read Computer Usage Policies
Industrial Management & Data Systems 108 (6) : 701 ~ 712
[2008]
What Influences IT Ethical Intentions-Planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?
Information and Management 24 : 177 ~ 187
[2004]
Use of Exploratory Factor Analysis in Published Research: Common Errors and Some Comment on Improved Practice
Educational and Psychological Measurement 66 (3) : 393 ~ 416
[2006]
Understanding attitudes and predicting social behavior
Ajzen, Icek
Prentice-Hall
[1980]
Understanding and mitigatinguncertainty in on-line exchange relationships: A principal-agentperspective
Pavlou
MIS Quarterly 31 (1) : 105 ~ 136
[2007]
The insider threat to information systems and the effectiveness of ISO17799
S.Kokolakis
Theoharidou
Computers & Security 24 : 472 ~ 484
[2005]
The Theory of Planned Behavior
Organizational Behavior and Human Decision Processes 50 (2) : 179 ~ 211
[1985]
Taking Stock : Can the Theory of Reasoned Action Explain Unethical Conduct
Journal of Business Ethics 8 : 873 ~ 882
[1989]
Sepecification, Evaluation, and Interpretation of Structural Equation Models
Journal of the Academy of Marketing Science 40 : 8 ~ 24
[2012]
Robustness of Partial Least-Squares Method for Estimating Latent Variable Quality Structures
Journal of Applied Statistics 26 (4) : 435 ~ 446
[1999]
Risks in the Use of Information Technology Within Organizations
International Journal of Information Management 16 (1) : 65 ~ 74
[1996]
Psychometric Theory
Pummer
McGraw-Hill
[2000]
Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
Herath
Herath, T.
Rao
European Journal of Information Systems 18 (2) : 106 ~ 125
[2009]
Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior
Chang
Journal of Business Ethics : 1825 ~ 1834
[1998]
Perceptions of Information Security in the Workplace : Linking Information Security Climate to Compliant Behavior
Journal of Information Privacy & Security 1 (3) : 18 ~ 41
[2005]
On the Buzzword 'Security Policy'
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy : 219 ~ 230
[1991]
Motivating IS Security Compliance : Insights from Habit and Protection Motivation Theory
Information & Management 49 : 190 ~ 198
[2012]
ModelingITEthics:A StudyinSituationalEthics
Banerjee
Cronan
Jones
MIS Quarterly 22 (1) : 31 ~ 59
[1998]
Metrics for Characterizing the Form of Security Policies
Journal of Strategic Information Systems 19 : 281 ~ 295
[2010]
Methodology in Business Ethics : A Review and Critical Assessment
Journal of Business Ethics 9 : 457 ~ 471
[1990]
Managing Information Systems Security
MacMillan Press
[1997]
Issues and Opinions on Structural Equation Modeling
Chin
MIS Quarterly 22 (1) : 7 ~ 16
[1998]
Information Security Policy : What Do International Information Security Standards Say?
Computers & Security 21 (5) : 402 ~ 409
[2002]
IS Security Policy Violations : A Rational Coice Perspective
Journal of Organizational and End User Computing 24 (1) : 21 ~ 41
[2012]
Factor retentiondecisions in exploratory factor analysis:A Tutorialon ParallelAnalysis
Hayton
Scarpello
Organizational Research Methods 7 (2) : 191 ~ 205
[2004]
Factor Analysis in Counseling Psychology Research, Training, and Practice: Principles, Advances, and Applications
Counseling Psychologist 34 (5) : 684 ~ 718
[2006]
Evaluating structural equation models with unobservable variables and measurement error
Fomell C. and Larcker D.F
Journal of Marketing Research 18 (1) : 39 ~ 50
[1981]
Evaluating Ethical Decision Maing and Computer Use
Communications of the ACM 39 (7) : 74 ~ 83
[1996]
Effective IS security: An empirical study
Straub
Information Systems Research 1 (3) : 255 ~ 276
[1990]
Deterring Internal Information Systems Misuse
Communications of the ACM 50 (10) : 113 ~ 117
[2007]
Commonmethod biases in behavioral research: A critical review of the literature andrecommended remedies
Podsakoff
Journal of Applied Psychology 88 (5) : 879 ~ 903
[2003]
Common Method Variance in IS Research : A Comparison of Alternative Approaches and a Reanalysis of Past Research
Management Science 52 (12) : 1865 ~ 1883
[2006]
Best Practices in Exploratory Factor Analysis : Four Recommendations for Getting the Most from Your Analysis, Practical Assessment
Research & Evaluation 10 (7) : 1 ~ 9
[2005]
Belief, attitude, intention, and behavior: An introduction to theory and research
Ajzen
Frishbein
Addison-Wesley
[1975]
Assessing the Unidimensionality of Measurement: a Paradigm and Illustration within the Context of Information Systems Research
Segar
Omega 25 (1) : 107 ~ 121
[1997]
Assessing construct validity inorganizational research
Bagozzi
Administrative Science Quarterly 36 (3) : 421 ~ 458
[1991]
Applied multivariate statistics for the social sciences
Stevens, James
Lawrence Erlbaum
[1995]
An Integrative Model of Compute Abuse Based on Social Control and General Deterrence Theories
Information and Management 41 (6) : 707 ~ 718
[2004]
An Information Security Meta-Policy for Emergent Organizations
Logistics Information Management 15 (5/6) : 337 ~ 346
[2002]
Accounting for common methodvariance in cross-sectional research designs
Lindell
Whitney
Journal of Applied Psychology 86 (1) : 114 ~ 121
[2001]
A Holistic Model of Computer Abuse within Organizations
Information Management & Computer Security 10 (2) : 57 ~ 63
[2002]
' 정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구'
의 유사주제(
) 논문