References
- 김종기, 강다연, 전진환, "패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인," 정보시스템연구, 제17권, 제1호, 2008, pp. 23-43.
- 김종기, 강다연, 전진환, "인터넷뱅킹 사용자의 보안의도에 영향을 미치는 요인에 관한 연구," 정보시스템연구, 제18권, 제2호, 2009, pp. 1-18.
- 김종기, 전진환, 임호섭, "정보보안정책, 보안통제 및 사용자특성이 정보보안효과에 미치는 영향: 컴퓨터 바이러스를 중심으로," 정보시스템연구, 제15권, 제1호, 2006, pp. 145-168.
- Bandura, A., Self-efficacy: The Exercise of Control, Worth Publishers, 1997.
- Browne, M. W. and Cudeck, R., Alternate Ways of Assessing Model Fit, In Bollen, Sage Publications; Newbury Park(CA), 1993.
- Carver, C. S. and Scheier, M. F., On the Self-regulation of Behavior, New York: Cambridge University Press, 2001.
- Carver, C. S. and Scheier, M. F., "Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology," Psychological Bullentin, Vol. 92, No. 1, 1982, pp. 111-135. https://doi.org/10.1037/0033-2909.92.1.111
- Carver, C. S., "Approach, Avoidance, And the Self-regulation of Affect and Action," Motivation and Emotion, Vol. 30, No. 2, 2006, pp. 105-110. https://doi.org/10.1007/s11031-006-9044-7
- Compeau, D. R. and Higgins, C. A., "Computer Self-Efficacy: Development of a Measure and Initial Test," MIS Quarterly, Vol. 19, No. 2, 1995, pp. 189-211. https://doi.org/10.2307/249688
- Crowne, D. and Marlowe, D., The Approval Motive: Studies in Evaluative Dependence, New York: Wiley, 1964.
- Diamantopoulos, A., "Incorporating Formative Measures into Covariance-Based Structural Equation Models," MIS Quarterly, Vol. 35, No. 2, 2011, pp. 335-358.
- Etezadi-Amoli, J. and Farhoomand, A. R., "A Structural Model of end User Computing Satisfaction and User Performance," Information & Management, Vol. 30, No. 2, 1996, pp. 65-73. https://doi.org/10.1016/0378-7206(95)00052-6
- Fishbein, M. and Ajzen, I., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, Addison-Wesley Publishing, 1975.
- Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
- Furnell, S., "Why Users Cannot Use Security," Computers & Security, Vol. 24, No. 4, 2005, pp. 274-279. https://doi.org/10.1016/j.cose.2005.04.003
- Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., Multivariate Data Analysis, 7th Edition., Prentice Hall International., 2010.
- Harris, P. L., Children and Emotion: The Development of Psychological Understanding, Oxford: Basil Blackwell, 1989.
- Hovland, C. I., Janis, I. L., and Kelly, H. H., Communication and Persuasion: Psychological Studies of Opinion Change, New Haven, CT: Yale University Press, 1953.
- Hu, L. and Bentler, P. M., "Cutoff Criteria Fit Indexes in Covariance Structure Analysis: Conventional Criteria Versus New Alternatives," Structural Equation Modeling, Vol. 6, No. 1, 1999, pp. 1-55. https://doi.org/10.1080/10705519909540118
- Janis, I. L., "Effects of Fear Arousal on Attitude Change: Recent Developments in Theory and Experimental Research," In Advances in Experimental Social Psychology, Vol. 3, 1967, pp. 166-244.
- Johnston, A. C. and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 549-566.
- Lazarus, R. S. and Folkman, S., Stress, Appraisal, and Coping, New York: McGraw-Hill, 1984.
- Leventhal, H., "Findings and Theory in the Study of Fear Communications," Advances in Experimental Social Psychology, Vol. 5, 1970, pp.119-186. https://doi.org/10.1016/S0065-2601(08)60091-X
- Leventhal, H., "Fear Appeals and Persuasion: The Differentiation of Motivational Construct," American Journal of Public Health, Vol. 61, No. 6, 1971, pp. 1208-1224. https://doi.org/10.2105/AJPH.61.6.1208
- Liang, H., Saraf, N., Hu, Qing., and Xue, Y., "Assimilation of Enterprise Systems: The Effect of Institutional Pressures and the Mediating Role of Top Management," MIS Quarterly, Vol. 31, No. 1, 2007, pp. 59-87.
- Liang, H. and Xue, Y., "Avoidance of Information Technology Threats: A Theoretical Perspective," MIS Quarterly, Vol. 33, No. 1, 2009, pp. 71-90.
- Lindell, M. K. and Whitney, D. J., "Accounting for Common Method Variance in Cross-sectional Research Designs," Journal of Applied Psychology, Vol. 86, No. 1, 2001, pp. 114-121. https://doi.org/10.1037/0021-9010.86.1.114
- Pajares, F. and Urdan, T., Self-efficacy Beliefs of Adolescents, Information Age Publishing, 2006.
- Pavlov, I., Conditioned Reflexes: An Investigation into the Physiological Activity of the Cortex, New York: Dover, 1927.
- Petter, S., Straub, D., and Rai, A., "Specifying Formative Constructs in Information systems Research," MIS Quarterly, Vol. 31, No. 4, 2007, pp. 623-656.
- Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P., "Common Method biases in Behavioral Research: A Critical Review of the Literature and Recommende Remedies," Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903. https://doi.org/10.1037/0021-9010.88.5.879
- Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology, Vol. 91, No. 1, 1975, pp. 93-114. https://doi.org/10.1080/00223980.1975.9915803
- Segars, A. H. and Grover, V., "Re-Examining Perceived Ease of Use and Usefulness: A Confirmatory Factor Analysis," MIS Quarterly, Vol. 17, No. 4, 1993, pp. 517-525. https://doi.org/10.2307/249590
- Siponen, M. and Vance, A., "Neutralization: New Insights into Problem of Employee Information Systems Security Policy Violations," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 487-502.
- Skinner, B. F., Science and Human Behavior, New York: Macmillan, 1953.
- Stober, J., "The Social Desirability Scale-17," European Journal of Psychological Assessment, Vol. 17, No. 3, 2001, pp. 222-232. https://doi.org/10.1027//1015-5759.17.3.222
- Sutton, S. K. and Davidson, R., "Prefrontal Brain Asymmetry: A Biological Substrate of the Behavioral Approach and Inhibition Systems," Psychological Science, Vol. 8, No. 3, 1997, pp. 204-210. https://doi.org/10.1111/j.1467-9280.1997.tb00413.x
- Turel, O., Serenko, A., and Giles, P., "Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users," MIS Quarterly, Vol. 35, No. 4, 2011, pp. 1043-1061.
- Tversky, A. and Kahneman, D., "Advances in Prospect Theory: Cumulative Representation of Uncertainty," Journal of Risk and Uncertainty, Vol. 5, No. 4, 1992, pp. 297-323. https://doi.org/10.1007/BF00122574
- Williams, L., Edwards, J. R., and Vandenberg, R. J., "Recent Advances in Causal Modeling Methods for Organizational and Management Research," Journal of Management, Vol. 29, No. 6, 2003, pp. 903-936. https://doi.org/10.1016/S0149-2063(03)00084-9
- Witte, K., "Putting the Fear Back into Fear Appeals: The Extended Parallel Process Model," Communication Monographs, Vol. 59, No. 4, 1992, pp. 329-349. https://doi.org/10.1080/03637759209376276
- Witte, K., "Fear Control and Danger Control: A Test of the Extended Parallel Process Model(EPPM)," Communication Monographs, Vol. 61, No. 2, 1994, pp. 113-134. https://doi.org/10.1080/03637759409376328