참고문헌
- 김계수, "인과분석 연구방법론", 청람, 2006.
- 김재전, 박경자, 노희옥, "기대일치성이 인터넷 쇼핑몰의 전반적 만족과 지속사용 의도에 미치는 영향", 인터넷전자상거래연구, 제9권, 제3호, pp. 313-336, 2009.
- 사이버 범죄현황, "http://www.netan.go.kr", 사이버 범죄수사대, 2010.
- 송지준, "SPSS/AMOS 통계분석방법", 21세기사, pp. 254-256, 2008.
- 유호선, 김민용, 권오병, "유비쿼터스 컴퓨팅 서비스 수용에 영향을 미치는 요인 연구", 한국전자거래학회논문지, 제13권, 제2호, pp. 117-147, 2008.
- 이수현, "인터넷 범죄의 실태와 대응방안", 법학논고, 제25호, pp. 269-307, 2006
- 한민옥, "알면 알수록 신기한 영화 속 보안기술의 세계 : 홍채, 지문 등 생체인식 해킹은 아직 영화 속 이야기", LG엔시스 Webzine, 2009. 8.
- Ajzen, I., "The Theory of Planned Behavior," Organizational Behaviour and Human Decision Processes, Vol. 50, pp. 179-211, 1991. https://doi.org/10.1016/0749-5978(91)90020-T
- Alexander P. P. and Peter P., "Understanding User Perspectives on Biometric Technology," Communication of The ACM, Vol. 51, No. 9, pp. 115-118, 2008 https://doi.org/10.1145/1378727.1389971
- Bhattacharya, R., Devinny, T. M., and Pilutla, M. A., "A Formal Model of Trust based on Outcomes," Academy of Management Review, Vol. 23, No. 3, pp. 459-472, 1998.
- Bhattacherjee, A., "Understanding Information Systems Continuance : an Expectation- Confirmation Model," MIS Quarterly, Vol. 25, pp. 351-371, 2001. https://doi.org/10.2307/3250921
- Bhattacherjee, A. and Premkumar, G., "Understanding Changes in Belief and Attitude Toward Information Technology Usage : A Theoretical Model and Longitudinal Test," MIS Quarterly, Vol. 28, No. 2, pp. 229-254, 2004. https://doi.org/10.2307/25148634
- Chircu, A. M., Davis, G. B., and Kauffman, R. J., "Trust, Expertise and E-commerce Intermediary Adoption," AMCIS 2000 Proceedings. Paper 405. http://aisel.aisnet.org/amcis2000/405, 2000.
- Churchill Jr., G. A. and Surprenanat, C., "An Investigation into the Determinants of Customer Satisfaction," Journal of Marketing Research, Vol. 19, pp. 491-504, 1982. https://doi.org/10.2307/3151722
- Coventry, L., A. De Angeli, and G. Johnson, "Usability and Biometric Verification at the ATM Interface," SIGCHI conference on Human factors in computing systems, pp. 153-160, 2003.
- Dabolkar, P. A., Shepard, C. D., and Thorpe, D. I., "A Comprehensive Framework for Service Quality : An Investigation of Critical Conceptual and Measurement Issues Through a Longitudinal Study," Journal of Retailing, Vol. 76, pp. 139-173, 2000. https://doi.org/10.1016/S0022-4359(00)00029-4
- Das, T. K. and Teng, B., "Between Trust and Control : Developing Confidence in Partner Cooperation in Alliance," Academy of Management Review, Vol. 23, No. 3, pp. 491-512, 1998.
- Davis, D., "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology," MIS Quarterly, Vol. 13, No. 3, pp. 319-340, 1989. https://doi.org/10.2307/249008
- DeLone, W. H. and McLean, E. R., "Information Systems Success. The Quest for the Dependent Variable," Information System Research, Vol. 3, pp. 60-95, 1992. https://doi.org/10.1287/isre.3.1.60
- Dinev, T. and Hart, P., "Internet Privacy Concern and their Antecedents-Measurement Validity and a Regression Model," Behavior and Information Technology, Vol. 23, No. 6, pp. 413-422, 2004. https://doi.org/10.1080/01449290410001715723
- Engel, J. F., Roger D., Bland, P., and Miniard, W., "Consumer Behavior," 6th ed., Dryden Press, 1990.
- Flavian, C. and Guinaliu, M., "Consumer Trust, Perceived Security and Privacy Policy : Three Basic Elements of Loyalty to a Web Site," Industrial Management and Data Systems, Vol. 106, No. 4, pp. 601-620, 2006. https://doi.org/10.1108/02635570610666403
- Garver, M. and J. Mentzer, "Logistics Research Methods : Employing Structural Equation Modeling to Test for Construct Validity," Journal of Business Logistics, Vol. 20, No. 1, pp. 33-58, 1999.
- Gefen, D. and Straub, D. W., "Gender Differences in the Perception and Use of e-mail: an Extension to the Technology Acceptance Model," MIS Quarterly : Management Information System, Vol. 21, No. 4, pp. 389-400, 1997. https://doi.org/10.2307/249720
- Gefen, D. and Straub, D. W., "Managing User Trust in e-services," E-service Journal, Vol. 1, No. 2, 2002.
- Gefen, D., "E-commerce : the Role of Familiarity and Trust," Omega, Vol. 28, No. 6, pp. 725-737, 2000. https://doi.org/10.1016/S0305-0483(00)00021-9
- Godwin, J. U., "Privacy and Security Concerns as a Major Barrier for e-commerce : a Survey Study," Information Management and Computer Security, Vol. 9, No. 4, pp. 165-174, 2001. https://doi.org/10.1108/EUM0000000005808
- Hopkins, R., "An Introduction to Biometrics and Large Scale Civilian Identification," International Review of Law Computer and Technology, Vol. 13, No. 3, pp. 337-363, 1999. https://doi.org/10.1080/13600869955017
- Hsu, C. and Lu, H., "Why Do People Play On-line Games? An extended TAM with Social Influences and Flow Experience," Information and Management, Vol. 41, No. 7, pp. 853-868, 2004. https://doi.org/10.1016/j.im.2003.08.014
- Jain, A., Hong, L., and Pankanti, S., "Biometric Identification," Communications of the ACM, Vol. 43, No. 2, pp. 91-98, 2000.
- James, T., T. Pirim, K. Boswell, B. Reithel, and R. Barkhi, "Determining the Intention to Use Biometric Devices : An Application and Extension of the Technology Acceptance Model," Journal of Organizational and End User Computing, Vol. 18, pp. 2319-2334, 2006.
- Jarvenpaa, S. L. and P. Todd, "Consumer Reactions to Electronic Shopping on the World Wide Web," International Journal of Electronic Commerce, Vol. 1, No. 2, pp. 59-88, 1996. https://doi.org/10.1080/10864415.1996.11518283
- Jarvenpaa, S. L., Tractinsky, N., and Vitale, M., "Consumer Trust in an Internet Store," Information Technology and Management, Vol. 1, No. 1, pp. 45-71, 2000. https://doi.org/10.1023/A:1019104520776
- Kalakota, R. and Whinston, A. B., "Electronic Commerce : A Manager's Guide," Addison Wesley, 1997.
- Laforet, S. and Li, X., "Consumers' Attitudes towards Online and Mobile Banking in China," International Journal of Bank Marketing, Vol. 23, No. 5, pp. 362-380, 2005. https://doi.org/10.1108/02652320510629250
- Lankton, N. and McKnight, D. H., "Using Expectation Disconfirmation Theory to Predict Technology Trust and Continuance Intention," invited paper presented at University of Minnesota, 2006.
- Lin, CS, S. Wu, and R. J, Tsai, "Integrating Perceived Playfulness into Expectation- Confirmation Model for Web Portal," Information and Management, Vol. 43, No. 5, pp. 683-693, 2005.
- Liu, S. and M. Silverman, "A Practical Guide to Biometric Security Technology," IT Professional Magazine, Jan/Feb., 2001. https://doi.org/10.1109/6294.899930
- Loch, K., Carr, H., and Warkentin, M., "Threats to Information Systems : Today's Reality, Yesterday's Understanding," MIS Quarterly, Vol. 16, No. 2, pp. 173-186, 1992. https://doi.org/10.2307/249574
- Mason, R., "For Ethical Issues of the Information Age," MIS Quarterly, Vol. 10, No. 1, pp. 5-12, 1986. https://doi.org/10.2307/248873
- Matsumoto, T., H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems," Proceedings of SPIE Vol. 4677, Optical Security and Counterfeit Deterrence Techniques IV, 2002.
- Mayer, R. C., Davis, J. H., and Schoorman, F. D., "An Integrative Model of Organization Trust," The Academy of Management Review, Vol. 20, No. 3, pp. 709-734, 1995.
- Moody, J., "Public Perceptions of Biometric Devices : The Effect of Misinformation on Acceptance and Use," Journal of Issues in Informing Science and Information Technology, Vol. 1, pp. 753-761, 2004. https://doi.org/10.28945/775
- Oliver, R. L., "A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions," Journal of Marketing Research, Vol. 17, No. 4, pp. 460-469, 1980. https://doi.org/10.2307/3150499
- Pavlou, P. A., "Consumer Acceptance of Electronic Commerce : Integrating Trust and Risk with the Technology Acceptance Model," International Journal of Electronic Commerce, Vol. 7, No. 3, pp. 101-134, 2003.
- Prabhaker, S., Pankati, S., and Jain, A. K., "Biometric Recognition : Security and Privacy Concerns," IEEE Security and Privacy, Vol. 1, No. 2, pp. 33-42, 2003. https://doi.org/10.1109/MSECP.2003.1193209
- Ring, P. S. and Van De Ven, A. H., "Developing Processes of Cooperative Inter-organizational Relationships," Academy of Management review, Vol. 19, pp. 90-118, 1994.
- Roberts, B., "Are You Ready for Biometrics?," HRMagazine, Vol. 48, No. 3, pp. 95-98, 2003.
- Roca, J. C., Chiu, C. M., and Martinez. F. J., "Understanding E-learning Continuance Intention : An Extension of the Technology Acceptance Model," Human-Computer Studies, Vol. 64, No. 8, pp. 683-696, 2006. https://doi.org/10.1016/j.ijhcs.2006.01.003
- Rosa, R. H., Patrick, A. S., and Ozok, A., "Perception and Acceptance of Fingerprint Biometric Technology," Symposium On Usable Privacy Security(SOUPS), 2007.
- Rousseau, D. M., Sitkin, S. G., Butt, R. S., and Camerer, C., "Not So Different After All : A Cross Discipline View of Trust," Academy of Management Review, Vol. 23, No. 3, pp. 393-404, 1998. https://doi.org/10.5465/AMR.1998.926617
- Siponen, M., "A Conceptual Foundation for Organizational Information Security," Information Management and Computer Security, Vol. 8, No. 1, pp. 31-41, 2000. https://doi.org/10.1108/09685220010371394
- Smith, H., Milberg, S., and Berke, S., "Information Privacy : Measuring Individuals' Concerns about Organizational Practices," MIS Quarterly, Vol. 20, pp. 167-196, 1996. https://doi.org/10.2307/249477
- Vatanasombut, B., M. Igbaria, A. C., and Stylianou, W., "Information Systems Continuance Intention of Web-based Applications Customers : The Case of Online Banking," Information and Management, Vol. 45, No. 7, pp. 419-428, 2008. https://doi.org/10.1016/j.im.2008.03.005
- Vijayasarathy, L. R., "Predicting Consumer Intentions to Use On-line Shopping : The Case for an Augmented Technology Acceptance Model," Information and Management, Vol. 41, No. 6, pp. 747-762, 2004. https://doi.org/10.1016/j.im.2003.08.011
- Westbrook, R. A. and Reilly, M. D., "Value-Percept Disparity : An Alternative to the Disconfirmation of Expectations Theory of Consumer Satisfaction," Advances in Comsumer Research, Vol. 10, pp. 256-261, 1983.
- Westin, A., "Privacy and Freedom," Ateneum, New York, 1967.
- Yi, Y., "A Critical Review of Consumer Satisfaction," Review of Marketing : American Marketing Association, Chicago, IL, pp. 68-123, 1990.
피인용 문헌
- A Novel Circle Detection Algorithm for Iris Segmentation vol.16, pp.12, 2013, https://doi.org/10.9717/kmms.2013.16.12.1385
- 업무용도로 이용되는 모바일 인스턴트 메신저에서 인지된 보안성, 인지된 프라이버시, 인지된 즐거움, 인지된 상호작용성이 지속이용의도에 미치는 영향에 관한 연구 vol.11, pp.3, 2015, https://doi.org/10.17662/ksdim.2015.11.3.159