참고문헌
- 김대진, 황인호, 김진수, "조직 구성원의 정보보안정책 준수행도에 대한 연구: 수정된 Triandis 모델의 적용," 디지털정책연구, 제14권, 제4호, pp.209-220.
- 김종기, "정보시스템 보안의 효과성 모형에 관한 실증적 연구," 정보시스템연구, 제7권 제2호, 1998, pp. 91-108.
- 김종기, 강다연, 전진환, "패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인," 정보시스템연구, 제17권 제1호, 2008, pp. 23-43.
- 박철주, 임명성, "기술스트레스가 조직원의 보안 인식과 조직성과에 미치는 영향에 관한 연구," 한국정보기술학회논문지, 제10권 제1호, 2012, pp.97-110.
- 이장형, 김종원, "보안 및 통제와 정보기술 사용자의 성격의 관계," 정보시스템연구, 제19권 제3호, 2010, pp.1-12.
- 보안뉴스, 대담하고 지능적인 기술유출, 산업보안이 뒷받침돼야, 2015. 5. 14. http://www.boannews.com/media/view.asp?idx=46241
- 황인호, 김대진, 김태하, 김진수, "조직의 정보보안 문화형성이 조직구성원의 보안 지식 및 준수의도에 미치는 영향 연구," Information Systems Review, 제18권, 제1호, 2016, pp.1-23.
- Brockner, J., Spreitzer, G., Mishra, A., Hochwarter, W., Pepper, L., and Weinberg, J., "Perceived Control as an Antidote to the Negative Effects of Layoffs on Survivors' Organizational Commitment and Job Performance," Administrative Science Quarterly, Vol. 49, No. 1, 2004, pp.76-100.
- Brown, W. S., "Ontological Security, Existential Anxiety and Workplace Privacy," Journal of Business Ethics, Vol. 23, No. 1, 2000, pp.61-65. https://doi.org/10.1023/A:1006223027879
- Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Information Security Policy Compliance:An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol. 34, No. 3, 2010, pp.523-548. https://doi.org/10.2307/25750690
- Carr, N. G., "IT doesn't Matter," Educause Review, Vol. 38, 2003, pp.24-38.
- Chan, M., Woon, I., and Kankanhalli, A. "Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior," Journal of Information Privacy & Security, Vol. 1, No. 3, 2005, pp.18-41. https://doi.org/10.1080/15536548.2005.10855772
- Chen, Y., Ramamurthy, K., and Wen, K. W., "Organizations' Information Security Policy Compliance: Stick or Carrot Approach?," Journal of Management Information Systems, Vol. 29, No. 3, 2012, pp.157-188. https://doi.org/10.2753/MIS0742-1222290305
- Compeau, D. R., and Higgins, C. A., "Computer Self-Efficacy: Development of a Measure and Initial Test," MIS Quarterly, Vol. 19, No. 2, 1995, pp.189-211. https://doi.org/10.2307/249688
- D'Arcy, J., Hovav, A., and Galletta, D., "User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, Vol. 20, No. 1, 2009, pp.79-98. https://doi.org/10.1287/isre.1070.0160
- Da Veiga, A., and Eloff, J. H., "A Framework and Assessment Instrument for Information Security Culture," Computers & Security, Vol. 29, No. 2, 2010, pp.196-207. https://doi.org/10.1016/j.cose.2009.09.002
- Dugo, T., "The Insider Threat to Organizational Information," Auburn University, Auburn, AL., 2007.
- Ernest Chang, S. and Lin, C. S., "Exploring Organizational Culture for Information Security Management," Industrial Management & Data Systems, Vol. 107, No. 3, 2007, pp.438-458. https://doi.org/10.1108/02635570710734316
- Faily, S., and Flechais, I., "Designing and Aligning e-Science Security Culture with Design," Information Management & Computer Security, Vol. 18, No. 5, 2000, pp.339-349. https://doi.org/10.1108/09685221011095254
- Fornell, C., and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp.39-50. https://doi.org/10.2307/3151312
- Gartner, Gartner Says Worldwide Information Security Spending Will Grow Almost 8 Percent in 2014 as Organizations Become More Threat-Aware, 2014, http://www.gartner.com/newsroom/id/2828722
- Guo, K. H., Yuan, Y., Archer, N. P. and Connelly, C. E., "Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model," Journal of Management Information Systems, Vol. 28, No. 2, 2011, pp.203-236. https://doi.org/10.2753/MIS0742-1222280208
- Herath, T., and Rao, H. R., "Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness," Decision Support Systems, Vol. 47, No. 2, 2009a, pp.154-165. https://doi.org/10.1016/j.dss.2009.02.005
- Herath, T., and Rao, H. R., "Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organizations," European Journal of Information Systems, Vol. 18, No. 2, 2009b, pp.106-125. https://doi.org/10.1057/ejis.2009.6
- Hu, Q., Xu, Z., Dinev, T., and Ling, H., "Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?," Communications of the ACM, Vol. 54, No. 6, 2011, pp.54-60. https://doi.org/10.1145/1953122.1953142
- Ifinedo, P., "Understanding Information Systems Security Policy Compliance:An Integration of the Theory of Planned Behavior and the Protection Motivation Theory," Computers & Security, Vol. 31, No. 1, 2012, pp.83-95. https://doi.org/10.1016/j.cose.2011.10.007
- Jimenez-Castillo, D., and Sanchez-Perez, M., "Nurturing Employee Market Knowledge Absorptive Capacity through Unified Internal Communication and Integrated Information Technology," Information & Management, Vol. 50, No. 2, 2013, pp.76-86. https://doi.org/10.1016/j.im.2013.01.001
- Johnston, A. C., and Warkentin, M., "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, No. 3, 2010, pp.549-566. https://doi.org/10.2307/25750691
- Knapp, K. J., Morris, R. F., Marshall, T. E., and Byrd, T. A., "Information Security Policy: An Organizational-Level Process Model," Computers & Security, Vol. 28, No. 7, 2009, pp.493-508. https://doi.org/10.1016/j.cose.2009.07.001
- Kwok, L. F., and Longley, D., "Information Security Management and Modelling," Information Management & Computer Security, Vol. 7, No. 1, 1999, pp.30-40. https://doi.org/10.1108/09685229910255179
- Lee, J., and Lee, Y., "A Holistic Model of Computer Abuse within Organizations," Information Management & Computer Security, Vol. 10, No. 2, 2002, pp.57-63. https://doi.org/10.1108/09685220210424104
- Lee, S. M., Lee, S. G., and Yoo, S., "An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories," Information & Management, Vol. 41, No. 6, 2004, pp.707-718. https://doi.org/10.1016/j.im.2003.08.008
- Lee, Y., and Larsen, K. R., "Threat or Coping Appraisal: Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems, Vol. 18, No. 2, 2009, pp.177-187. https://doi.org/10.1057/ejis.2009.11
- Li, H., Zhang, J., and Sarathy, R., "Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory," Decision Support Systems, Vol. 48, No. 4, 2010, pp.635-645. https://doi.org/10.1016/j.dss.2009.12.005
- Loch, K. D., Carr, H. H., and Warkentin, M. E., "Threats to Information Systems:Today's Reality, Yesterday's Understanding," MIS Quarterly, Vol. 16, No. 2, 1992, pp.173-186. https://doi.org/10.2307/249574
- Moore, G. C., and Benbasat, I., "Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation," Information Systems Research, Vol. 2, No. 3, 1991, pp.192-222. https://doi.org/10.1287/isre.2.3.192
- Murrell, A. J., and Sprinkle, J., "The Impact of Negative Attitudes toward Computers on Employees' Satisfaction and Commitment within a Small Company," Computers in Human Behavior, Vol. 9, No. 1, 1993, pp.57-63. https://doi.org/10.1016/0747-5632(93)90021-J
- Nunnally, J. C., "Psychometric theory (2nd ed.)," New York: McGraw-Hill, 1978.
- Padayachee, K., "Taxonomy of Compliant Information Security Behavior," Computers & Security, Vol. 31, No. 5, 2012, pp.673-680. https://doi.org/10.1016/j.cose.2012.04.004
- Pahnila, S., Siponen, M., and Mahmood, A., "Employees' Behavior towards IS Security Policy Compliance," In System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on (pp. 156b-156b). IEEE, 2007.
- Rogers, R. W., "A Protection Motivation Theory of Fear Appeals and Attitude Change," Journal of Psychology, Vol. 91, No. 1, 1975, pp.93-114. https://doi.org/10.1080/00223980.1975.9915803
- Simon, H. A., "Bounded Rationality in Social Science: Today and Tomorrow," Mind & Society, Vol. 1, No. 1, 2000, pp.25-39. https://doi.org/10.1007/BF02512227
- Simonson, M. R., Maurer, M., Montag-Torardi, M., and Whitaker, M., "Development of a Standardized Test of Computer Literacy and a Computer Anxiety Index," Journal of Educational Computing Research, Vol. 3, No. 2, 1987, pp.231-247. https://doi.org/10.2190/7CHY-5CM0-4D00-6JCG
- Sims, C. A., "Implications of Rational Inattention," Journal of Monetary Economics, Vol. 50, No. 3, 2003, pp.665-690. https://doi.org/10.1016/S0304-3932(03)00029-1
- Sinkula, J. M., "Market Information Processing and Organizational Learning," The Journal of Marketing, Vol. 58, No. 1, 1994, pp.35-45. https://doi.org/10.2307/1252249
- Siponen, M., Pahnila, S., and Mahmood, M. A., "Compliance with Information Security Policies: An Empirical Investigation," Computer, Vol. 43, No. 2, 2010, pp.64-71. https://doi.org/10.1109/MC.2010.35
- Siponen, M., and Vance, A., "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations," MIS Quarterly, Vol. 34, No. 3, 2010, pp.487-502. https://doi.org/10.2307/25750688
- Son, J. Y., "Out of Fear or Desire? Toward a Better Understanding of Employees' Motivation to Follow IS Security Policies," Information & Management, Vol. 48, No. 7, 2011, pp.296-302. https://doi.org/10.1016/j.im.2011.07.002
- Stanton, J. M., Stam, K. R., Guzman, I., and Caldera, C., "Examining the Linkage between Organizational Commitment and Information Security," In IEEE International Conference on Systems Man and Cybernetics, Vol. 3, 2003, October, pp. 2501-2506.
- Stanton, J. M., Stam, K. R., Mastrangelo, P., and Jolton, J., "Analysis of End User Security Behaviors," Computers & Security, Vol. 24, No. 2, 2005, pp.124-133. https://doi.org/10.1016/j.cose.2004.07.001
- Steers, R., "Antecedents and Outcomes of Organizational Commitment," Administrative Science Quarterly, Vol. 22, No.1, 1977, pp.46-56. https://doi.org/10.2307/2391745
- Straub, D. W., and Welke, R. J., "Coping with Systems Risk: Security Planning Models for Management Decision Making," MIS Quarterly, Vol. 22, No. 4, 1998, pp.441-464. https://doi.org/10.2307/249551
- Tarafdar, M., Tu, Q., Ragu-Nathan, B. S., and Ragu-Nathan, T. S., "The Impact of Technostress on Role Stress and Productivity," Journal of Management Information Systems, Vol. 24, No.1, 2007, pp.301-328. https://doi.org/10.2753/MIS0742-1222240109
- Todd, P. M., and Gigerenzer, G., "Bounding Rationality to the World," Journal of Economic Psychology, Vol. 24, No. 2, 2003, pp.143-165. https://doi.org/10.1016/S0167-4870(02)00200-3
- Vance, A., Siponen, M., and Pahnila, S., "Motivating IS Security Compliance:Insights from Habit and Protection Motivation Theory," Information & Management, Vol. 49, No. 3, 2012, pp.190-198. https://doi.org/10.1016/j.im.2012.04.002
- Venkatesh, V., "Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model," Information Systems Research, Vol. 11, No. 4, 2000, pp.342-365. https://doi.org/10.1287/isre.11.4.342.11872
- Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, Vol. 27, No. 3, 2003, pp.425-478. https://doi.org/10.2307/30036540
- Verizon., Verizon 2013 Data Breach Investigations Report, 2013.
- Walpole, R. E., Myers, R. H., Myers, S. L., and Ye, K., Probability and statistics for engineers and scientists (Vol. 5). New York: Macmillan, 1993.
- Wang, P. A., "Information Security Knowledge and Behavior: An Adapted Model of Technology Acceptance," In Education Technology and Computer (ICETC), 2010 2nd International Conference on (Vol. 2, pp. V2-364). IEEE, 2010, June.
- West, R., "The Psychology of Security," Communications of the ACM, Vol. 51, No. 4, 2008, pp.34-40. https://doi.org/10.1145/1330311.1330320
- Whitman, M. E., "In Defense of the Realm: Understanding the Threats to Information Security," International Journal of Information Management, Vol. 24, No. 1, 2004, pp.43-57. https://doi.org/10.1016/j.ijinfomgt.2003.12.003
- Williams, L. J., and Anderson, S. E., "Job Satisfaction and Organizational Commitment as Predictors of Organizational Citizenship and In-role Behaviors," Journal of Management, Vol. 17, No. 3, 1991, pp.601-617. https://doi.org/10.1177/014920639101700305
- Wixom, B. H., and Watson, H. J., "An Empirical Investigation of the Factors Affecting Data Warehousing Success," MIS Quarterly, Vol. 25, No. 1, 2001, pp.17-41. https://doi.org/10.2307/3250957
- Zhang, J., Reithel, B. J., and Li, H,. "Impact of Perceived Technical Protection on Security Behaviors," Information Management & Computer Security, Vol. 17, No. 4, 2009, pp.330-340. https://doi.org/10.1108/09685220910993980