References
- Berejikian, J. D.(2002), "A Cognitive Theory of Deterrence", Journal of Peace Research, Vol. 39, No. 2, pp. 165-183. https://doi.org/10.1177/0022343302039002002
- Bulgurcu, B., Cavusoglu, H., and Benbasat I.(2010), "Information Security Policy Com- pliance: An Empirical Study of Rationality -Based Beliefs and Information Security Awareness", MIS Quarterly, Vol. 34, No. 3, pp. 523-548. https://doi.org/10.2307/25750690
- Chen, C. C., Medlin, B. D., and Shaw, R. S.(2008), "A Cross-Cultural Investigation of Situational Information Security Awareness Programs", Information Management and Computer Security, Vol. 16, No. 4, pp. 360-376. https://doi.org/10.1108/09685220810908787
- Choi, N., Kim, D., Goo, J. and Whitmore, A.(2008), "Knowing is Doing: An Empirical Validation of the Relationship between Managerial Information Security Awareness and Action", Information Management and Computer Security, Vol .16, No. 5, pp. 484-501. https://doi.org/10.1108/09685220810920558
- Drevin, L., Kruger, H. A. and Steyn, T.(2007), "Value Focused Assessment of ICT Security Awareness in an Academic Environment", Computers and Security, Vol .26, No. 1, pp. 36-43. https://doi.org/10.1016/j.cose.2006.10.006
- Frank, J., Shamir, B. and Briggs, W.(1991), "Security-related Behavior of PC Users in Organizations", Information and Management, Vol. 21, No. 3, pp. 127-135. https://doi.org/10.1016/0378-7206(91)90059-B
- Goodhue, D. L. and Straub, D. W.(1991), "Security Concerns of System User: A Study of Perceptions of the Adequacy of Security", Information and Management, Vol. 20, No. 1, pp. 13-27. https://doi.org/10.1016/0378-7206(91)90024-V
- Govindarajan, V. and Fisher, J(1990)., "Strategy, Control Systems, and Resource Sharing: Effects on Business-unit Performance", The Academy of Management Journal, Vol. 33, No. 2, pp. 259-285. https://doi.org/10.2307/256325
- Ha, S. W. and Kim, H. J.(2013), "The Effects of User's Security Awareness on Password Security Behavior", Journal of Digital Contents Society Vol. 14 No. 2, pp. 179-189. https://doi.org/10.9728/dcs.2013.14.2.179
- Kang, D. Y. and Chang, M. H.(2012), "Factors Influencing on the Compliance of Information Security Policy of Workers of Shipping and Port Organization", The Korea Port Economic Association, Vol. 28, No. 1, pp. 1-23.
- Kang, J. Y.(2013), "A Study on the Systematized and Unified Plan of Port Logistics Security Management System" Journal of Law and Politics research, Vol. 13, No. 2, pp. 389-436.
- Kankanhalli, A., Teo, H. H., Tan, B. C. Y. and Wei, K. (2003), "An Integrative Study of Information Systems Security Effectiveness", International Journal of Information Manage- ment, Vol. 23, No. 2, pp. 139-154. https://doi.org/10.1016/S0268-4012(02)00105-6
- Kim, H. j. and Ahn, J. H.(2013), "An Empirical Study of Employee's Deviant Behavior for Improving Efficiency of Information Security Governance", Society for e-Business Studies, Vol. 18, No. 1, pp. 147-164. https://doi.org/10.7838/jsebs.2013.18.1.147
- Kim, S. H. and Song, Y. M.(2011), "An Empirical Study on Motivational Factors Influencing Information Security Policy Com- pliance and Security Behavior of End-Users (Employees) in Organizations", The e-Business Studies, Vol. 12, No. 3, pp. 327-249. https://doi.org/10.15719/geba.12.3.201109.327
- Knapp, K. J., Marshall, T. E., Rainer, R. K., and Ford, F. N.(2005), "Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness. White Paper", Information Systems Security Certification Consortium (ISC), Vol. 2.
- Layton, T.(2005), Information Security Awareness : The Psychology behind the Technology, AuthorHouse.
- Lebow, R. and Stein. J.(1990), "Deterrence: The Elusive Dependent Variable", World Politics, Vol. 42, No. 3, pp. 336-369. https://doi.org/10.2307/2010415
- Lee, S. M., Lee,. S. G. and Yoo. S.(2004), "An Integrative Model of Computer Abuse Based on Social Control and General Deterrence Theories", Information and Management, Vol. 41, No. 6, pp. 707-718. https://doi.org/10.1016/j.im.2003.08.008
- Lee, S. J. and Lee, M. J.(2008), "An Exploratory Study on the Information Security Culture Indicator", Informatization policy, Vol. 15, No.3, pp.100-119.
- Nosworthy, J.(2000), "Implementing Information Security in the 21st Century-do You Have the Balancing Factors?", Computer and Security, Vol. 19, No. 4, pp. 337-347. https://doi.org/10.1016/S0167-4048(00)04021-9
- Park, C. J. and Yim, M. S.(2012), "An Understanding of Impact of Security Counter- measures on Persistent Policy Compliance", The Society of Digital Policy & Management, Vol. 10, No. 4, pp. 23-35.
- Park, I. B. and Kim, J. D.(2011), "A Study on the Policy Management for Industrial Security's Culture", The Journal of Korean Association for Industry Security, Vol. 2, No.1, pp. 33-46.
- Park, J. Y.(2012), "An Analysis on Training Curriculum for Educating Information Security Experts", Management Information Systems Review, Vol. 31, No. 1, pp.149-165. https://doi.org/10.29214/damis.2012.31.1.007
- Park, S. S.(2007), "Concept of Strategy in Organizational Information Security", Journal of Information and Security, Vol. 7, No. 3, pp. 15-24.
- Rezgui, Y., and Marks, A.(2008), "Information Security Awareness in Higher Education: An Exploratory Study", Computers and Security, Vol. 27 No. 7-8, pp. 241-253. https://doi.org/10.1016/j.cose.2008.07.008
- Stanton, J., Stam, K., Mastrangelo, P., Jolton, J.(2005), "Analysis of End User Security Behaviors", Computers and Security, Vol. 24, No. 2, pp. 124-133. https://doi.org/10.1016/j.cose.2004.07.001
- Siponen, M. T.(2000), "A Conceptual Foundation for Organization Information Security Awareness", Information Management and Computer Security, Vol. 8, No. 1, pp. 31-41. https://doi.org/10.1108/09685220010371394
- Siponen, M., Pahnila S., and Mahmood, M. A.(2010), "Compliance with Information Security Policies: An Empirical Investigation", Computer, Vol. 43, No. 2, pp. 64-71. https://doi.org/10.1109/MC.2010.35
- Sun, H. G.(2005), "Impacts of Information Security Policies and Organizations on the Information Security Performance in Korean Enterprises", The Korea Society of Management Information Systems proceedings, Vol. 2005, No. 1, pp. 1087-1095.
- Woo, S. H.(2012), "A Study on Security Capability of IDPS", The Institute of Electronics and Information Engineers-CI, Vol. 49, No. 4, pp.9-15. https://doi.org/10.5573/ieek.2012.49.11.009
- Workman, M., and Gathegi, J.(2006), "Puni- shment and Ethics Deterrents: A Study of Insider Security Contravention", Journal of the American Society for Information Science and Technology, Vol. 58, No. 2, pp. 212-222. https://doi.org/10.1002/asi.20474
- Yim, M. S.(2012), "A Path Way to Increase the Intention to Comply with Information Security Policy of Employees", The Society of Digital Policy & Management, Vol. 10, No. 10, pp. 119-128.