참고문헌
- B. Stvilia, L. Gasser, M. B. Twidale and L. C. Smith, "A Framework for Information Quality Assessment", Journal of the American Society for Information Science and Technology, Vol. 58, No. 12, pp. 1720-1733, 2007. https://doi.org/10.1002/asi.20652
- C. J. Park and M. S. Yim, "An Understanding of Impact of Security Countermeasures on Persistent Policy Compliance", Journal of Digital Convergence, Vol. 10, No. 4, pp. 23-35, 2012.
- D. M. Strong, Y. W. Lee and R. Y. Wang, "Data Quality in Context", Communications of the ACM, Vol. 40, No. 5, pp. 103-110, 1997.
- K. Hone and J. H. P. Eloff, "What Makes an Effective Information Security Policy?", Network Security, Issue 6, No. 1, pp. 14-16, 2002.
- L. L. Pipino, Y. W. Lee and R. Y. Wang, "Data Quality Assessment", Communications of the ACM, Vol. 45, No. 4ve, pp. 211-218, 2002. https://doi.org/10.1145/505248.506010
- M. Chan, I. Woon and A. Kankanhalli, "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior", Journal of Information privacy & Security, Vol. 1, No. 3, pp. 18-41, 2005. https://doi.org/10.1080/15536548.2005.10855772
- M. Chae, J. Kim, H. Kim and H. Ryu, "Information Quality for Mobile Internet Services: A Theoretical Model with Empirical Validation", Electronic Markets, Vol. 12, No. 1, pp. 38046, 2002.
- M. S. Yim, "A Path Way to Increase the Intention to Comply with Information Security Policy of Employees", Journal of Digital Convergence, Vol. 10, No. 10, pp. 119-128, 2012.
- M. Theoharidou, S. Kokolakis, M. Karyda and E. Kiountouzis, "The Insider Threat to Information Systems and the Effectiveness of ISO17799", Computers & Security, Vol. 24, pp. 472-484, 2005. https://doi.org/10.1016/j.cose.2005.05.002
- N. Gorla, T. M. Somers and B. Wong, "Organizational Impact of System Quality, Information Quality, and Service Quality", Journal of Strategic Information Systems, Vol. 19, pp. 207-228, 2010. https://doi.org/10.1016/j.jsis.2010.05.001
- R. Y. Wang and D. M. Strong, "Beyond Accuracy: What Data Quality Means to Data Consumers", Journal of Management Information Systems, Vol. 12, No. 4, pp. 5-34, 1996. https://doi.org/10.1080/07421222.1996.11518099
- S. Goel and I. N. Chengalur-Smith, "Metrics for Characterizing the Form of Security Policies", Journal of Strategic Information Systems, Vol. 19, pp. 281-295, 2010. https://doi.org/10.1016/j.jsis.2010.10.002
- S. Petter and E. R. McLean, "A Meta-Analytic Assessment of the DeLone and McLean IS Success Model: An Examination of IS Success at the Individual Level", Information & Security, Vol. 46, pp. 159-166, 2009.
- T. Herath and H. R. Rao, "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations", European Journal of Information Systems, Vol. 18, pp. 106-125, 2009. https://doi.org/10.1057/ejis.2009.6
- T. S. Jeong, M. S. Yim and J. B. Lee, "A Development of Comprehensive Framework for Continuous Information Security", Journal of Digital Convergence, Vol. 10, No. 2, pp. 1-10, 2012.
-
Trend Micro, "Vulnerabilities under Attack: Shedding Light on the Growing Attack Surface",
$TrendLabs^{SM}$ 3Q 2014 Security Roundup, 2014. - W. H. DeLone and E. R. McLean, "The DeLone and McLean Model of Information Systems Success: A Ten-Year Update", Journal of Management Information Systems, Vol. 19, No. 4, pp. 9-30, 2003. https://doi.org/10.1080/07421222.2003.11045748
- Y. W. Lee, D. M. Strong, B. K. Kahn and R. Y. Wang, "AIMQ: A Methodology for Information Quality Assessment", Information & Security, Vol. 40, pp. 133-146, 2002.
- Y. Wand R. Y. Wang, "Anchoring Data Quality Dimensions in Ontological Foundations", Communications of the ACM, Vol. 39, No. 11, pp. 86-95, 1996.
피인용 문헌
- A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment vol.6, pp.4, 2015, https://doi.org/10.15207/JKCS.2015.6.4.139
- A Study for Secure the Reliability of Automated Warehouse System vol.14, pp.10, 2016, https://doi.org/10.14400/JDC.2016.14.10.253
- Relationships among Information Resources Use, Problem Solving Ability, Nursing Information Literacy Competency in General Hospital Nurses vol.14, pp.7, 2016, https://doi.org/10.14400/JDC.2016.14.7.289
- Convergence of Related Standard of CC and ISO for Security Evaluation of VPN vol.14, pp.5, 2016, https://doi.org/10.14400/JDC.2016.14.5.341
- The Convergence between Manufacturing and ICT: The Exploring Strategies for Manufacturing version 3.0 in Korea vol.14, pp.3, 2016, https://doi.org/10.14400/JDC.2016.14.3.219