References
- T. Jung, "Cyber Attack & Security Technology, HONGRUNG PUBLISHING COMPANY, 2009
- S. Kim, M. S, "The Effects of the Perception of an Online Risk and Prior Knowledge on Public's Communication Behavior", KOREAN ASSOCIATION FOR ADVERTISING AND PUBLIC RELATIONS, Vo l. 13, pp. 528-568, 2011
- G. Moon, J. Kim, M. Hong, "A Graphical Passowrd Scheme Resistant to Shoulder Surfing Attack in Mo bile Environments", Journal of computing science and engineering, Vol. 18, pp. 90-94, 2012
- Y. Bang, et al, "Improving information security management: An analysis of ID-password usage and a new login vulnerability measure", International Journal of Information Management, Vol. 32, pp. 409-418, 2012 https://doi.org/10.1016/j.ijinfomgt.2012.01.001
- D. Kang, "The Influence of Password Selection on the Security Effectiveness", Pusan National University, 2008
- G. Post, A. Kagan, "Evaluating information security tradeoffs: Restricting access can interfere with user tasks", Computers&Security, Vol. 26, pp. 229-237, 2007
- C. McCoy, R. Fowler, "You are the key to security: establishing a successful security awareness program", SIGUCCS'04 Proceedings of the 32nd annual ACM SIGUCCS fall conference, pp. 346-349, 2004
- M. Chang, D. Kang, "Factors Affecting the Informati on Security Awareness and Perceived Information Security Risk of Employees of Port Companies", Journal of Navigation and Port Research, Vol. 36, pp. 261-271, 2012 https://doi.org/10.5394/KINPR.2012.36.3.261
- Ministry of Information and Communication, "A white paper of Protect the National information Security ",2006
- ISO/IEC, Guidelines for the Management of IT Security (GMITS), International Organization for Standardization/International Electrotechnical Commission, 2005
- Y. Lee, "A Study on Factors Influencing the Preventive Efforts toward Personal Information Privacy", Sungkyunkwan University, 2009
- G. Lee, Y. Dong, "Measure for the risk of leakage of personal information about the methods and pract ices of private companies", Korea Institute of Inform ation Security & Cryptology. Vol. 18, pp. 92-100, 2008
- L. Drevin, H.A. Kruger, T. Steyn, "Value-focused assessment of ICT security awareness in an academic environment", Computers & Security, Vol. 26, pp. 445-451, 2007 https://doi.org/10.1016/j.cose.2007.09.001
- J. Kim, D. Kang, "The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness", Korea Institute of Information Security & Cryptology, Vol. 18, pp. 123-133, 2008
- V. Mitchell, "Consumer perceived risk: conceptualisations and models", European Journal of Marketing, Vol. 33, pp. 163-195, 1999 https://doi.org/10.1108/03090569910249229
- I. Jang, "Exploring the Relationship between Prevention Behavior of Privacy Leakage and Perceived Risk, Efficacy Beliefs of Internet User: Use RPA(Risk Perception Attitude) Framework, Kookmin University, 2010
- W. Lee, "The Influence of Security and Risk Perception on the Reuse of Internet Banking", Asia Pacific Journal of Information Systems, Vol. 17, pp. 77-93, 2007
- Cohen. J, "Statistical power analysis for the behavio ral sciences(2nd ed.)", Hillsdale, NJ:Erlbaum, 1988
- R. Baron, D. Kenny, "The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations", Journal of Personality and Social Psychology, Vo l. 51, pp1173-1182, 1986 https://doi.org/10.1037/0022-3514.51.6.1173
- M. Kumar, et. al, "Reducing shoulder-surfing by using gaze-based password entry", SOUPS' 07, pp. 13-19, 2007
- D. Carstens, P. McCauley-Bell, "Evaluation of the Human Impact of Password Authentication practices on Information Security", Informing Science Journal, Vol. 7, pp. 67-85, 2004
- J. Choi, "Using weak passwords is same as open the front door to the thief", http://www.coconut.co.kr/04news/secu/0712/htm/seculetter02.html
- B. Ives, K. Walsh, H. Schneider, "The domino effect of password reuse". Communications of the ACM - Human-computer etiquette, Vol. 47, pp. 75-78, 2004
- C. Kim, S. Lee, E. O, "The Impact of Interaction Factors of Digital Contents on Flow and Use Intention", Digital Contents Society, Vol. 11, pp.212-224, 2011
Cited by
- Analysis of a Security Survey for Smartphones vol.11, pp.3, 2015, https://doi.org/10.5392/IJoC.2015.11.3.014
- The Causal Relationship between Information Security Countermeasures and Information System Misuse vol.14, pp.4, 2015, https://doi.org/10.9716/KITS.2015.14.4.081
- 해운항만조직의 정보보안이행이 정보보안성과에 미치는 영향 vol.40, pp.4, 2013, https://doi.org/10.5394/kinpr.2016.40.4.213
- 온라인 사용자의 비밀번호 보호행위 : 공포 소구와 메시지 프레이밍 효과, 그리고 비밀번호 보호행위의 동기요인 vol.16, pp.3, 2013, https://doi.org/10.9716/kits.2017.16.3.147
- The Effect of Information Security Delivery Activities and Feedback on Work Impediment and Compliance Intention vol.21, pp.9, 2020, https://doi.org/10.9728/dcs.2020.21.1.1653
- The Influence of Organizational Goal Orientation and Structure on Information Security Compliance Intention vol.21, pp.12, 2013, https://doi.org/10.9728/dcs.2020.21.12.2179
- Analysis of the Effects of Information Security Sanction and Role Ambiguity on Compliance Intention: Focusing on Moderation Effects of Technical Support and Task Coping vol.22, pp.2, 2021, https://doi.org/10.9728/dcs.2021.22.2.271
- The Effects of Information Security Organizational Injustice on Information Security Anxiety and Avoidance Behavior: Focusing on Moderation Effects of Victim Justice Sensitivity vol.22, pp.5, 2013, https://doi.org/10.9728/dcs.2021.22.5.855