References
- Anderson, C. L., and Agarwal, R. 2006. "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behavior Intentions." in International Conference on Information Systems, 1543-1561.
- Bandura, A. 1977. "Self-efficacy: Toward a unifying theory of behavior change." Psychological Review 84:191-215. https://doi.org/10.1037/0033-295X.84.2.191
- Cha, D. P. 2007. "The Role of Threat and Efficacy in the Fear Appeal Messages: Multiplicative Relationship, or Additive Relationship?." Korean Journal of Advertising 9(2):339-363.
- Chin, W. W., Marcolin, B. L., and Newsted, P. R. 2003. "A partial least squares latent variable modeling approach for measuring interaction effects: Results from a monte carlo simulation study and an electronic-mail emotion/adoption study." Information Systems Research 14(2):189-217. https://doi.org/10.1287/isre.14.2.189.16018
- Choi, J. Y. 2007. "A Study on the Privacy Protection in Hospital Information System." M.S dissertations, University of Wonkwang.
- Claar, C. L. 2011. The adoption of computer security: An analysis of home personal computer user behavior using the health belief model. Utah: Utah State University Press.
- Compeau, D. R., Higgins, C. A., and Huff, S. 1999. "Social cognitive theory and individual reactions to computing technology: a longitudinal study." MIS Quarterly 23(2):145-158. https://doi.org/10.2307/249749
- Davis, F. D. 1989. "Perceived usefulness, perceived ease of use, and user acceptance of information technology." MIS Quarterly 13(3):319-338. https://doi.org/10.2307/249008
- Gurung, A., Luo, X., and Liao, Q. 2009. "Consumer motivation in taking action against spyware: An empirical investigation." Information Management and Computer Security 17(3):276-289. https://doi.org/10.1108/09685220910978112
- Jee, B. S., Fan, L., Lee, S. C., and Suh, Y. H. 2011. "Personal Information Protection Behavoir for Information Quality: Health Psychology Theory Perspectives." Journal of Korean Society for Quality Management 39(3):432-443.
- Ji, H. J. 2008. "A Study on the Patient Privacy Portection of Medical Information for Internet." The Journal of The Institute of Webcasting, Internet and Telecommunication 8(5):235-236.
- Lee, Y. 2011. "Understanding anti-plagiarism software adoption: An extended protection motivation theory perspective." Decision Support Systems 50:361-369. https://doi.org/10.1016/j.dss.2010.07.009
- Liang, H., and Xue, Y. 2009. "Avoidance of information technology threats: A theoretical perspective." MIS Quarterly 33(1):71-90. https://doi.org/10.2307/20650279
- Liang, H., and Xue, Y. 2010. "Understanding Security Behaviors in Personal Computer Usage: A threat Avoidance Perspective." Journal of the Association for Information Systems 7(2):393-413.
- Maddus, J. E., and Rogers, R. W. 1983. "Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change." Journal of Experimental Social Psychology 19:469-479. https://doi.org/10.1016/0022-1031(83)90023-9
- Ng, B. Y., Kankanhalli, A., and Xu, Y. C. 2009. "Studing users' computer security behavior: A health belief perspective." Decision Support System 46(4):815-825. https://doi.org/10.1016/j.dss.2008.11.010
- Oliver, R. L., and Berger, P. K. 1979. "A path analysis of preventive health care decision models." Journal of Consumer Research 6(2):113-122. https://doi.org/10.1086/208755
- Rhodes, K. 2001. "Operations security awareness: the mind has no firewall." Computer Security Journal 16(2):27-36.
- Rogers, R. W. 1975. "A protection motivation theory of fear appeals and attitude change." Journal of Psychology 91:93-114. https://doi.org/10.1080/00223980.1975.9915803
- Rogers, R. W., and Petty, R. 1983. Cognitive and physiological process in fear appeals and attitude change: A revised theory of protection motivation. Social Psychophysiology, A Source Book, 153-176. New York: Guilford Press.
- Rosenstock, I. M. 1974. "The health belief model and preventive health behavior." Health education Monographs 2:354-386. https://doi.org/10.1177/109019817400200405
- Rosenstock, I. M., Strecher, V., and Becker, M. 1994. "The Health Belief Model and HIV risk behavior change." In Preventing AIDS: Theories and methods of behavioral interventions, edited by DiClemente, R. J. & Peterson, J. L., 5-24. New York: Plenum Press.
- Venkatesh, V. 2000. "Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model." Information System Research 11(4):342-365. https://doi.org/10.1287/isre.11.4.342.11872
- Weinstein, N. D. 2000. "Perceived probability, perceived severity, and health-protective behavior." Health Psychology 19(1):65-74. https://doi.org/10.1037/0278-6133.19.1.65
- Workman, M., Bommer, W. H., and Straub, D. 2008. "Security lapses and the omission of information security measures: A threat control model and empirical test." Computers in Human Behavior 24(6):2799-2816. https://doi.org/10.1016/j.chb.2008.04.005
- Youn, S. 2005. "Teenagers' Perception of Online Privacy and Coping Behavior: A Risk-Benefit Appraisal Approach." Journal of Broadcasting & Electronic Media 49(1):86-110. https://doi.org/10.1207/s15506878jobem4901_6
- Youn, S. 2009. "Determinants of Online Privacy Concern and its Influence on Privacy Protection Behaviors Among Young Adolescents." The Journal of Consumer affairs 43(3):389-418. https://doi.org/10.1111/j.1745-6606.2009.01146.x