References
- D.W. Kim and W.J. Seong, "A Study on Information Security Policy in the Era of Smart Society", Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 4, pp. 883-899, 2012. http://www.ndsl.kr/ndsl/commons/util/ndsl
- Korea Internet and Security Agency (KISA), "2012 state survey for information security (home/business)", Policy report, Ministry of Science, ICT and Future Planning, 2012.
- K.C. Laudon and J.P. Laudon, Management Information Systems, Pearson, 13th Edition. 2014.
- K.D. Kwon, "The opening future by smartphone", Samsung Economic Research Institute, 714, 2010.
- W.R. Jeon, J.Y. Kim, et al., "Analysis of Threats and Countermeasures on Mobile Smartphone", Journal of The Korea Society of Computer and Information, vol. 16, no. 2, pp. 153-163, 2011. DOI : 10.9708/jksci.2011.16.2.153
- K.J. Lee, "A Study on Enhanced Security Model of Smartphone based on Information Security Management System", Seoul National University of Science and Technology, Master thesis, 2012.
- T.H. Kim, H.W. Jin, et al., "Analysis of Android Mobile Platform Security Model", Korea Internet and Security Agency (KISA), 2010.
- S.P. Jobs, "WWDC 2010 Apple Keynote," 2010.
- H.Y. Shin, "An Empirical Study on Information Security Behavior Intent of Smartphone Users", Yeungnam Univ. Doctor thesis, 2013.
- J.S. Oho, "Study on the leakage of personal information through the iOS jailbreak", Chungnam Univ. Master thesis, 2012.
- H.R. Ryu, M. Hong, and T.K. Kwon, "Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks- from User Experience and HCI Perspectives", Journal of Internet Computing and Services, vol. 15, no. 3, pp. 79-90, 2014. http://dx.doi.org/10.7472/jksii.2014.15.3.79
- J.K. Yang, G.U. Ha, and H.B. Kim, "An analysis of loss cases and counterfeiting methods of new phising of smartphone", Journal of the Korea Institute of Information Security and Cryptology, vol. 23, no. 4, pp. 73-81, 2013. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E02238723
- I.W. Park and D.W. Park, "A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone", Journal of the Korea Institute Of Information and Communication Engineering, vol. 17, no. 11, pp. 2588-2594, 2013. DOI : 10.6109/jkiice.2013.17.11.2588
- M. Fishbein and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, Mass: Addison-Wesley, 1975.
- H.S. Lee and Y. Kim, "Critiques and Alternative Suggestions on the Theory of Reasoned Action and the Theory of Planned Behavior", Journal of Consumer Studies, vol. 11, no. 4, pp. 21-47, 2000. http://academic.naver.com/view.nhn?doc_id=10896 524
- J.G. Jeong and K.J. Jang, "A study on acceptance factor of smartphone centered on real users", The e-Business Studies, vol. 11, no. 4, pp. 361-379, 2010. http://www.dbpia.co.kr/Journal/ArticleDetail/NODE01765870 https://doi.org/10.15719/geba.11.4.201011.361
- E.Y. Na, "Recent trends of attitude and attitude change studies: 1985-1994", Korean Psychological Journal of Society and Personality, vol. 15, pp. 3-33, 1994. http://academic.naver.com/view.nhn?doc_id=10462985
- I. Ajzen, Attitude structure and behavior, In Pratkanins, A.R., S.J. Beckler & A.G. Greenwald(Eds.), Attitude structure and function(chap. 10, pp. 241-274), Hillsdale, NJ: Lawrence Erlbaum Association, 1989.
- A.H. Eagly and S. Chaiken, "The psychology of attitudes", Fort Worth: Harcourt Brace Jovanovich College Publishers, 1993.
- F.D. Davis, R.P. Bagozzi, and P.R. Warshaw, "Perceived usefulness, perceived ease of use, and user acceptance of information technology", MIS Quarterly, vol. 13, no. 3, pp. 319-340, 1989. DOI: 10.2307/249008
- D.H. Shin, "An analysis for Cyworld users through technology acceptance model and structured equation model approach", Trends/Studies report, Korean Association for Broadcasting & Telecommunication Studies, p.33-52, 2008. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E01104221
- J.S. Lee, H. Cho, G. Gay, B. Davidson, and A.R. Ingraffea, "Technology acceptance and social networking in distance learning", Educational Technology & Society, vol. 6, no. 2, pp. 50-61, 2003. http://www.ifets.info/journals/6_2/6.html
- J.H. Yoo and C. Park, "A Comprehensive Review of Technology Acceptance Model Researches," Entrue Journal of Information Technology, vol. 9, no. 2, pp. 31-50, 2010. UCI: I410-ECN-0102-2012-560-001711426
- H. Yu, S. Sura, and J.C. Ahn, "An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service", Journal of Internet Computing and Services, vol. 16, no. 3, pp. 79-93, 2015. http://dx.doi.org/10.7472/jksii.2015.16.3.79
- J. Cho and S.J. Kim, "Factors of Leading the Adoption of Diet/Exercise Apps on Smartphones: Application of Channel Expansion Theory", Journal of Internet Computing and Services, vol. 16, no. 1, pp. 101-108, 2015. http://dx.doi.org/10.7472/jksii.2015.16.1.101
- J.C. Ahn, S.W. Lee, et al., "A study on the influence of information security in selecting smart-phone", Journal of the Korea Institute of Information Security and Cryptology, vol. 24, no. 1, pp. 207-214, 2014. http://dx.doi.org/10.13089/JKIISC.2014.24.1.207
- I.K. Park and D.H. Shin, "Using the Uses and Gratifications Theory to Understand the Usage and the Gratifications of Smartphones", Journal of Communication Science, vol. 10, no. 4, pp. 192-225, 2010. http://www.dbpia.co.kr/Journal/PDFViewNew?id=NODE01572022&prevPathCode=
- J.K. Kim and S.T. Nam, "Factors Influencing Smartphones Purchase Decision : With a Focus on the Comparison among Users of Smartphones, Non-Users, and related Company Workers", The Journal of Internet Electronic Commerce Research, vol. 11, no. 3, pp. 23-34, 2011. http://academic.naver.com/view.nhn?doc_id=74840744
- L. Leung and R. Wei, "More than just talk on the move: uses and gratifications of the cellular phone", Journalism & Mass Communication Quarterly, vol. 77, no. 2, pp. 308-320, 2000. http://images4.wikia.nocookie.net/cb20060711180826/scratchpad/images/e/ed/More_than_just_talk.pdf https://doi.org/10.1177/107769900007700206
- S.H. Kim, "Effects of Perceived Attributes on the Purchase Intention of Smart-Phone", The Journal of the Korea Contents Association, vol. 10, no. 9, pp. 318-326, 2010. DOI : 10.5392/JKCA.2010.10.9.318
- J.K. Bae and H.M. Jeong, "Effect on influencing acceptance decision factor by functional attributes of smartphone", The e-Business Studies, vol. 9, no. 4, pp. 337-361, 2008. http://www.dbpia.co.kr/Journal/ArticleDetail/NOD E01769371 https://doi.org/10.15719/geba.9.4.200811.337
- S.J. Oho, "Smartphone user's typology and its effect on their purchasing behavior : a case study of users", Hankuk University of Foreign Studies, Doctor thesis, 2011.
- S.B. Kang and D.H. Yang, "User-centered response method trends of smartphone security threats", Journal of the Korea Institute of Information Security and Cryptology, vol. 24, no. 3, pp. 36-43, 2014. http://ocean.kisti.re.kr/IS_mvpopo001P.do?method=multMain&poid=kiisc&free
- S.T. Nam, D.G. Kim, and C.Y. Jin, "A study on the continuous intention to use for Smartphone based on the innovation diffusion theory: Considered on the loyalty between users of iOS and Android platform", Journal of the Korea Institute Of Information and Communication Engineering, vol. 17, no. 5, pp. 1219- 1226, 2013. DOI : 10.6109/jkiice.2013.17.5.1219
- Y.H. Chang, S.B. Pyo, et al., "A Study on Hacking Attack when Free WiFi Internet Access In Smartphone", Proceedings of the Korean Society of Computer Information Conference, vol. 9, 2011. http://www.ndsl.kr/ndsl/commons/util/ndslOriginalView.do
- J.Y. Jang, J.D. Kim, and B.S. Kim, "The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW", Journal of Information Technology Services, vol. 13, no. 2, pp. 113-131, 2014. http://dx.doi.org/10.9716/KITS.2014.13.2.113
- S.G. Kim, "A study of influencing on perceived usefulness, ease of use, and acceptance intention by user environments and smartphone charateristic attributes", Hongik Univ. Master thesis, 2009.
- H.J. Park, "The Effect of Online Information Characteristics on the Intention to Use Restaurant Information: Focused on the Mediating Effect of Perceived ease of Use, Perceived Usefulness, Trust", Sejong Univ. Master thesis, 2011.
- D.H. Shih, B.S. Lin, et al., "Security aspects of mobile phone virus: a critical survey", Industrial Management & Data Systems, vol. 108, no. 4, pp. 478-494, 2008. http://dx.doi.org/10.1108/02635570810868344
- C. Fornell and D.F. Larcker, "Evaluating Structural Equations with Unobservable Variables and Measurement Error", Journal of Marketing Research, vol. 18, no. 1, pp. 39-50, 1981. http://www.jstor.org/stable/3151312 https://doi.org/10.2307/3151312
- M.C. Shin, Basic Statistics for Business and Economics, Changmin publishing, Seoul, 2010.
- J.J. Park, "A Study on the influence of information security in consumer's preference of iOS and Android based smartphones", Hanyang Univ. Master thesis, 2015.