정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구

임명성 2013년
논문상세정보
    • 저자 임명성
    • 제어번호 99574748
    • 학술지명 디지털융복합연구
    • 권호사항 Vol. 11 No. 1 [ 2013 ]
    • 발행처 한국디지털정책학회
    • 발행처 URL http://www.policy.or.kr
    • 자료유형 학술저널
    • 수록면 27-38 ( 12쪽)
    • 언어 Korean
    • 출판년도 2013
    • KDC 569
    • 등재정보 KCI등재
    • 판매처 학술교육원
    유사주제 논문( 798)
' 정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 공익사업
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
799 4

0.0%

' 정보보안정책의 특성이 구성원들의 보안정책 준수 행위에 미치는 영향에 관한 연구' 의 참고문헌

  • Why Users (Fail to) Read Computer Usage Policies
    Industrial Management & Data Systems 108 (6) : 701 ~ 712 [2008]
  • What Influences IT Ethical Intentions-Planned Behavior, Reasoned Action, Perceived Importance, or Individual Characteristics?
    Information and Management 24 : 177 ~ 187 [2004]
  • Use of Exploratory Factor Analysis in Published Research: Common Errors and Some Comment on Improved Practice
    Educational and Psychological Measurement 66 (3) : 393 ~ 416 [2006]
  • Understanding and mitigatinguncertainty in on-line exchange relationships: A principal-agentperspective
    Pavlou MIS Quarterly 31 (1) : 105 ~ 136 [2007]
  • The insider threat to information systems and the effectiveness of ISO17799
    S.Kokolakis Theoharidou Computers & Security 24 : 472 ~ 484 [2005]
  • The Theory of Planned Behavior
    Organizational Behavior and Human Decision Processes 50 (2) : 179 ~ 211 [1985]
  • Taking Stock : Can the Theory of Reasoned Action Explain Unethical Conduct
    Journal of Business Ethics 8 : 873 ~ 882 [1989]
  • Sepecification, Evaluation, and Interpretation of Structural Equation Models
    Journal of the Academy of Marketing Science 40 : 8 ~ 24 [2012]
  • Robustness of Partial Least-Squares Method for Estimating Latent Variable Quality Structures
    Journal of Applied Statistics 26 (4) : 435 ~ 446 [1999]
  • Risks in the Use of Information Technology Within Organizations
    International Journal of Information Management 16 (1) : 65 ~ 74 [1996]
  • Psychometric Theory
    Pummer McGraw-Hill [2000]
  • Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
    Herath Herath, T. Rao European Journal of Information Systems 18 (2) : 106 ~ 125 [2009]
  • Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior
    Chang Journal of Business Ethics : 1825 ~ 1834 [1998]
  • Perceptions of Information Security in the Workplace : Linking Information Security Climate to Compliant Behavior
    Journal of Information Privacy & Security 1 (3) : 18 ~ 41 [2005]
  • On the Buzzword 'Security Policy'
    Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy : 219 ~ 230 [1991]
  • Motivating IS Security Compliance : Insights from Habit and Protection Motivation Theory
    Information & Management 49 : 190 ~ 198 [2012]
  • ModelingITEthics:A StudyinSituationalEthics
    Banerjee Cronan Jones MIS Quarterly 22 (1) : 31 ~ 59 [1998]
  • Metrics for Characterizing the Form of Security Policies
    Journal of Strategic Information Systems 19 : 281 ~ 295 [2010]
  • Methodology in Business Ethics : A Review and Critical Assessment
    Journal of Business Ethics 9 : 457 ~ 471 [1990]
  • Managing Information Systems Security
    MacMillan Press [1997]
  • Issues and Opinions on Structural Equation Modeling
    Chin MIS Quarterly 22 (1) : 7 ~ 16 [1998]
  • Information Security Policy : What Do International Information Security Standards Say?
    Computers & Security 21 (5) : 402 ~ 409 [2002]
  • IS Security Policy Violations : A Rational Coice Perspective
    Journal of Organizational and End User Computing 24 (1) : 21 ~ 41 [2012]
  • Factor retentiondecisions in exploratory factor analysis:A Tutorialon ParallelAnalysis
    Hayton Scarpello Organizational Research Methods 7 (2) : 191 ~ 205 [2004]
  • Factor Analysis in Counseling Psychology Research, Training, and Practice: Principles, Advances, and Applications
    Counseling Psychologist 34 (5) : 684 ~ 718 [2006]
  • Evaluating structural equation models with unobservable variables and measurement error
    Fomell C. and Larcker D.F Journal of Marketing Research 18 (1) : 39 ~ 50 [1981]
  • Evaluating Ethical Decision Maing and Computer Use
    Communications of the ACM 39 (7) : 74 ~ 83 [1996]
  • Effective IS security: An empirical study
    Straub Information Systems Research 1 (3) : 255 ~ 276 [1990]
  • Deterring Internal Information Systems Misuse
    Communications of the ACM 50 (10) : 113 ~ 117 [2007]
  • Commonmethod biases in behavioral research: A critical review of the literature andrecommended remedies
    Podsakoff Journal of Applied Psychology 88 (5) : 879 ~ 903 [2003]
  • Common Method Variance in IS Research : A Comparison of Alternative Approaches and a Reanalysis of Past Research
    Management Science 52 (12) : 1865 ~ 1883 [2006]
  • Best Practices in Exploratory Factor Analysis : Four Recommendations for Getting the Most from Your Analysis, Practical Assessment
    Research & Evaluation 10 (7) : 1 ~ 9 [2005]
  • Belief, attitude, intention, and behavior: An introduction to theory and research
    Ajzen Frishbein Addison-Wesley [1975]
  • Assessing the Unidimensionality of Measurement: a Paradigm and Illustration within the Context of Information Systems Research
    Segar Omega 25 (1) : 107 ~ 121 [1997]
  • Assessing construct validity inorganizational research
    Bagozzi Administrative Science Quarterly 36 (3) : 421 ~ 458 [1991]
  • An Integrative Model of Compute Abuse Based on Social Control and General Deterrence Theories
    Information and Management 41 (6) : 707 ~ 718 [2004]
  • An Information Security Meta-Policy for Emergent Organizations
    Logistics Information Management 15 (5/6) : 337 ~ 346 [2002]
  • Accounting for common methodvariance in cross-sectional research designs
    Lindell Whitney Journal of Applied Psychology 86 (1) : 114 ~ 121 [2001]
  • A Holistic Model of Computer Abuse within Organizations
    Information Management & Computer Security 10 (2) : 57 ~ 63 [2002]