Acknowledgement
This work was supported by the Institute for Business Research & Education (IBRE).
References
- 김종기, 오다운, "전자상거래의 프라이버시정책 인식이 개인정보제공의도에 미치는영향", Information Systems Review, 제18권, 제3호, 2016, pp. 185-207. https://doi.org/10.29214/damis.2016.35.4.011
- 안호주, 장재영, 김범수, "금융기관 종사자들을 정보보안 위험관리로 이끄는 요인", Information Systems Review, 제17권, 제3호, 2015, pp. 39-64. https://doi.org/10.14329/isr.2015.17.3.039
- 유소은, 김태하, 차훈상, "스마트폰 이용자의 모바일 광고 수용의사에 영향을 주는 요인: 개인화된 서비스, 개인정보보호, 광고 피로도 사이에서의 딜레마", Information Systems Review, 제17권, 제2호, 2015, pp. 77-100. https://doi.org/10.14329/isr.2015.17.2.077
- 최보미, 박민정, 채상미, "개인정보보호 기술수용행동에 영향을미치는 요인에 대한 연구", Information Systems Review, 제17권, 제3호, 2015, pp. 77-94. https://doi.org/10.14329/isr.2015.17.3.077
- Armstrong, M., "Competition in two-sided markets", The RAND Journal of Economics, Vol.37, No.3, 2006, pp. 668-691. https://doi.org/10.1111/j.1756-2171.2006.tb00037.x
- August, T. and T. I. Tunca, "Network software security and user incentives", Management Science, Vol.52, No.11, 2006, pp 1703-1720. https://doi.org/10.1287/mnsc.1060.0568
- August, T. and T. I. Tunca, "Who should be responsible for software security? A comparative analysis of liability policies in network environments", Management Science, Vol.57, No.5, 2011, pp 934-959. https://doi.org/10.1287/mnsc.1100.1304
- Bonneau, J., C. Herley, P. C. Van Oorschot, and F. Stajano, "The quest to replace passwords: A framework for comparative evaluation of web authentication schemes", IEEE Symposium on Security and Privacy, July 2012, pp. 553-567.
- Campbell, J., N. Greenauer, K. Macaluso, and C. End, "Unrealistic optimism in internet events", Computers in Human Behavior, Vol.23, No.3, 2007, pp. 1273-1284. https://doi.org/10.1016/j.chb.2004.12.005
- Cantafio, B., "Security vs. convenience. Is RSA secur ID the answer", Global Information Assurance Certification Paper, Vol.1, 2004, p. 4.
- Cavusoglu, H., H. Cavusoglu, and J. Zhang, "Security patch management: Share the burden or share the damage?", Management Science, Vol.54, No.4, 2008, pp. 657-670. https://doi.org/10.1287/mnsc.1070.0794
- Economides, N. and J. Tag, "Network neutrality on the Internet: A two-sided market analysis", Information Economics and Policy, Vol.24, No.2, 2012, pp. 91-104. https://doi.org/10.1016/j.infoecopol.2012.01.001
- Feng, T., Z. Liu, K. A. Kwon, W. Shi, B. Carbunar, Y. Jiang, and N. Nguyen, "Continuous mobile authentication using touchscreen gestures", IEEE Conference on Technologies, 2012, pp. 451-456.
- Freedman, L. P., M. C. Gibson, S. P. Ethier, H. R. Soule, R. M. Neve, and Y. A. Reid, "Reproducibility: Changing the policies and culture of cell line authentication", Nature Methods, Vol.12, No.6, 2015, pp. 493-497. https://doi.org/10.1038/nmeth.3403
- Glass, S., T. Hiller, S. Jacobs, and C. Perkins, "Mobile IP Authentication, Authorization, and Accounting Requirements", No. RFC 2977, 2000.
- Grosse, E. and M. Upadhyay, "Authentication at scale", IEEE Security & Privacy, Vol.11, No.1, 2013, pp. 15-22. https://doi.org/10.1109/MSP.2012.162
- Grossklags, J., N. Christin, and J. Chuang, "Secure or insure?: A game-theoretic analysis of information security games", In Proceedings of the 17th International Conference on World Wide Web, 2008, pp. 209-218.
- Hagiu, A., "Pricing and commitment by two sided platforms", The RAND Journal of Economics, Vol.37, No.3, 2006, pp. 720-737. https://doi.org/10.1111/j.1756-2171.2006.tb00039.x
- Huang, P., M. Ceccagnoli, C. Forman, and D. J. Wu, "Appropriability mechanisms and the platform partnership decision: Evidence from enterprise software", Management Science, Vol.59, No.1, 2013, pp. 102-121. https://doi.org/10.1287/mnsc.1120.1618
- Jeun, I., M. Kim, and D. Won, "Enhanced password-based user authentication using smart phone", International Conference on Grid and Pervasive Computing, 2012, pp 350-360.
- Katz, M. L. and C. Shapiro, "Network externalities, competition, and compatibility", The American Economic Review, Vol.75, No.3, 1985, pp. 424-440.
- Katz, M. L. and C. Shapiro, "Technology adoption in the presence of network externalities", The Journal of Political Economy, Vol.94, No.4, 1986, pp. 822-841. https://doi.org/10.1086/261409
- Kim, B. C. and Y. W. Park, "Security versus convenience? An experimental study of user misperceptions of wireless internet service quality", Decision Support Systems, Vol.53, No.1, 2012, pp. 1-11. https://doi.org/10.1016/j.dss.2011.08.006
- Kim, B. C., P. Y. Chen, and T. Mukhopadhyay, "The effect of liability and patch release on software security: The monopoly case", Production and Operations Management, Vol.20, No.4, 2011, pp. 603-617. https://doi.org/10.1111/j.1937-5956.2010.01189.x
- Lamport, L., "Password authentication with insecure communication", Communications of the ACM, Vol.24, No.11, 1981, pp. 770-772. https://doi.org/10.1145/358790.358797
- Li, Z. and A. Agarwal, "Platform integration and demand spillovers in complementary markets: Evidence from Facebook's integration of Instagram", Management Science, 2016, pp. 1-22.
- Neuman, B. C. and T. Ts'o, "Kerberos: An authentication service for computer networks", IEEE Communications Magazine, Vol.32, No.9, 1994, pp. 33-38. https://doi.org/10.1109/35.312841
- Rabkin, A., "Personal knowledge questions for fallback authentication: Security questions in the era of Facebook", In Proceedings of the 4th Symposium on Usable Privacy and Security, 2008, pp. 13-23.
- Rochet, J. C. and J. Tirole, "Platform competition in two-sided markets", Journal of the European Economic Association, Vol.1, No.4, 2003, pp. 990-1029. https://doi.org/10.1162/154247603322493212
- Ryan Holmes, "Hootsuite's CEO on what he learned from getting hacked on social media", Harvard Business Review, 2016, Available at https://hbr.org/2016/10/hootsuites-ceo-on-what-he-learned-from-getting-hacked-on-social-media/. 10/hootsuites-ceo-on-what-he-learned-from-getting-hacked-on-social-media/
- Tam, L., M. Glassman, and M. Vandenwauver, "The psychology of password management: A tradeoff between security and convenience", Behaviour & Information Technology, Vol.29, No.3, 2010, pp. 233-244. https://doi.org/10.1080/01449290903121386
- Wang, R., L. Xing, X. Wang, and S. Chen, "Unauthorized origin crossing on mobile platforms: Threats and mitigation", In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, 2013, pp. 635-646.
- Yenisey, M. M., A. A. Ozok, and G. Salvendy, "Perceived security determinants in e-commerce among Turkish university students", Behaviour & Information Technology, Vol.24, No.4, 2005, pp. 259-274. https://doi.org/10.1080/0144929042000320992