References
- 곽금주 (1998). "자기효능감과 도덕적 이탈 ( I )." 한국심리학회지: 발달, 11(1): 1-11.
- 김계수 (2013). Smartpls 이용 쉬운 구조방정식모델. 청람
- 김보라.이종원.김범수 (2018). "보안교육 및 보안서비스가 조직구성원의 정보보안정책 준수에 미치는 영향." 정보화정책, 25(1): 99-114. https://doi.org/10.22693/NIAIP.2018.25.1.099
- 김상현.송영미 (2011). "조직 구성원들의 정보보안 정책 준수 동기요인에 관한 연구." e-비즈니스연구, 12(3): 327-349.
- 김상훈.박선영 (2011). "정보보안 정책 준수 의도에 대한 영향요인." 한국전자거래학회지, 16(4): 33-51. https://doi.org/10.7838/JSEBS.2011.16.4.033
- 김지미.김정민 (2013). "부모의 심리적 통제와 아동의 도덕적 이탈이 또래 괴롭힘 참여자 역할행동에 미치는 영향." 아동학회지, 34(6): 13-29. https://doi.org/10.5723/KJCS.2013.34.6.13
- 김혜정.안중호 (2013). "정보보호 거버넌스 효율성 제고를 위한 조직원의 정보보호 행위에 관한 실증연구." 한국전자거래학회지, 18(1): 147-164. https://doi.org/10.7838/jsebs.2013.18.1.147
- 이경률.이선영.임강빈 (2017). "인터넷 뱅킹 서비스에서의 보안위협 분류 및 분석." 정보화정책, 24(2): 20-42. https://doi.org/10.22693/NIAIP.2017.24.2.020
- 이성식 (2015). "SNS상의 범죄행위 설명에 있어 사회학습이론과 보완적 논의의 검증." 정보화정책, 22(4): 91-104. https://doi.org/10.22693/NIAIP.2015.22.4.091
- 이정하.이상용 (2015). "금융회사 정보보안정책의 위반에 영향을 주는 요인 연구: 지각된 고객정보 민감도에 따른 조절효과." JITAM, 22(4): 225-251.
- 임명성 (2013). "정보보안 상황에서의 도덕적 해방: 선행요인과 결과요인에 대한 연구." 디지털융복합연구, 11(11): 1-13. https://doi.org/10.14400/JDPM.2013.11.11.1
- 한국인터넷진흥원 (2018). "KISA Report." RSA Conference 2018 특집편
- 황인호.김대진.김태하.김진수 (2016). "조직의 정보보안 문화형성이 조직 구성원의 보안지식 및 준수의도에 미치는 영향 연구." Information Systems Review, 18(1): 1-23. https://doi.org/10.14329/isr.2016.18.1.001
- Alnuaimi, O. A., Robert, L. P. & Maruping, L. M. (2010). "Team size, dispersion, and social loafing in technology-supported teams: A perspective on the theory of moral disengagement." Journal of Management Information Systems, 27(1): 203-230. https://doi.org/10.2753/MIS0742-1222270109
- Ayyagari, R., Grover, V. & Purvis, R. (2011). "Technostress: Technological Antecedents and Implications." MIS Quarterly, 35(4): 831-858. https://doi.org/10.2307/41409963
- Bandura, A. (1999). "Moral Disengagement in the Perpetration of Inhumanities." Personality and Social Psychology Review, 3(3): 193-209. https://doi.org/10.1207/s15327957pspr0303_3
- Bandura, A., Barbaranelli, C., Caprara, G. V. & Pastorelli, C. (1996). "Mechanisms of Moral Disengagement in the Exercise of Moral Agency." Journal of Personality and Social Psychology, 71(2): 364-373. https://doi.org/10.1037/0022-3514.71.2.364
- Chan, M., Woon, I. & Kankanhalli, A. (2005). "Perceptions of information security in the workplace: linking information security climate to compliant behavior." Journal of Information Privacy and Security, 1(3): 18-41. https://doi.org/10.1080/15536548.2005.10855772
- Chatman, J. A. (1989). "Matching people and organizations: Selection and socialization in public accounting firms." Academy of Management Proceedings, 1989(1): 199-203. https://doi.org/10.5465/ambpp.1989.4980837
- Cheng, L., Li, Y., Li, Y., Holm, E. & Zhai, Q.(2013). "Understanding the Violation of IS Security Policy in Organizations: An Integrated Model Based on Social Control and Deterrence Theory." Computers & Security, 39(Part B): 447-459.
- Chu, A. M. & Chau, P. Y. (2014). "Development and Validation of Instruments of Information Security Deviant Behavior." Decision Support Systems, 66: 93-101.
- Chu, A. M., Chau, P. Y. & So, M. K. (2015). "Explaining the misuse of information systems resources in the workplace: A dual-process approach." Journal of Business Ethics, 131(1): 209-225. https://doi.org/10.1007/s10551-014-2250-4
- Cohen, J. O. (1988). Statistical Power analysis for the behavioral science(2nd ed.), Hillsdale, New Jersey, Lawrence erlbaum associates.
- Cox, J. (2012) "Information systems user security: A structured model of the knowing-doing gap." Computers in Human Behavior, 28(5): 1849-1858. https://doi.org/10.1016/j.chb.2012.05.003
- D'arcy, J., Herath, T. & Shoss, M. K. (2014). "Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective." Journal of Management Information Systems, 31(2): 285-318. https://doi.org/10.2753/MIS0742-1222310210
- D'Arcy, J., Hovav, A. & Galletta, D. (2009). "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach." Information Systems Research, 20(1): 79-98. https://doi.org/10.1287/isre.1070.0160
- Dang, D., Pittayachawan, S. & Bruno, V. (2015). "Factors of people-centric security climate: Conceptual model and exploratory study in Vietnam." ACIS 2015 Proceedings.
- Detert, J. R., Trevino, L. K. & Sweitzer, V. L. (2008). "Moral disengagement in ethical decision making: a study of antecedents and outcomes." Journal of Applied Psychology, 93(2): 374. https://doi.org/10.1037/0021-9010.93.2.374
- Edwards, I. R. & Shipp, A. I. (2007). "The relationship between person-environment fit and outcomes: An integrative." Perspectives on organizational fit, 1-75.
- Edwards, J. R. (1996). "An Examination of Competing Version of the Person-Environment Fit Approach to Stress." Academy of Management Journal, 39: 292-339.
- Enterprise, Verizon. (2017). 2017 Data Breach Investigations Report.
- Greene, G. & D'Arcy, J. (2010). "Assessing the Impact of Security Culture and the Employee-Organization Relationship on IS Security Compliance." In 5th Annual Symposium on Information Assurance, 1-8.
- Guo,, K. H. (2013) "Security-related behavior in using information systems in the workplace: A review and synthesis." Computer & Security, 32: 242-251. https://doi.org/10.1016/j.cose.2012.10.003
- Guo, K. H., Yuan, Y., Archer, N. P. & Connelly, C. E. (2011). "Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model." Journal of Management Information Systems, 28(2): 203-236. https://doi.org/10.2753/MIS0742-1222280208
- Guo, K. H. & Yuan, Y. (2012). "The Effects of Multilevel Sanctions on Information Security Violoations: A Mediating Model." Information & Management, 49(6): 320-326. https://doi.org/10.1016/j.im.2012.08.001
- Herath, T. & Rao, H. R. (2009). "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness." Decision Support Systems, 47(2): 154-165. https://doi.org/10.1016/j.dss.2009.02.005
- Hovav, A. & D'Arcy, J. (2012). "Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea." Information & Management, 49(2): 99-110. https://doi.org/10.1016/j.im.2011.12.005
- Hsu, J. S. C., Shih, S. P., Hung, Y. W. & Lowry, P. B. (2015). "The role of extra-role behaviors and social controls in information security policy effectiveness." Information Systems Research, 26(2): 282-300. https://doi.org/10.1287/isre.2015.0569
- Kim, H. W., Y. Xu, & J. Koh. (2004). "A comparison of online trust building factors between potential customers and repeat customers." Journal of the Association for Information Systems, 5(10): 392-420. https://doi.org/10.17705/1jais.00056
- Lee, C., Lee, C. C. & Kim, S. (2016). "Understanding information security stress: Focusing on the type of information security compliance activity." Computer & Security, 59: 60-70.
- Mishra, S. & Dhillon, G. (2006). "Information systems security governance research: a behavioral perspective." In 1st Annual Symposium on Information Assurance, Academic Track of 9th Annual NYS Cyber Security Conference. 27-35.
- Moore, C., Detert, J. R., Klebe Trevino, L., Baker, V. L. & Mayer, D. M. (2012). "Why employees do bad things: Moral disengagement and unethical organizational behavior." Personnel Psychology, 65(1): 1-48. https://doi.org/10.1111/j.1744-6570.2011.01237.x
- Padayachee, K. (2016). "An assessment of opportunity-reducing techniques i n information security: An insider threat perspective." Decision Support Systems, 92: 47-56. https://doi.org/10.1016/j.dss.2016.09.012
- Pinsonneault, A. & Kraemer, K. (1993). "Survey research methodology in management information systems: an assessment." Journal of Management Information Systems, 10(2): 75-105.
- Safa, N. S., Maple, C., Watson, T. & Von Solms, R. (2018). "Motivation and opportunity based model to reduce information security insider threats in organisations." Journal of Information Security and Applications, 40: 247-257. https://doi.org/10.1016/j.jisa.2017.11.001
- Silverthorne, C. (2004). "The Impact of Organizational Culture and Person-Organization Fit on Organizational Commitment and Job Satisfaction in Taiwan." Leadership & Organization Development Journal, 25(7): 592-599. https://doi.org/10.1108/01437730410561477
- Siponen, & Vance. (2010). "Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations." MIS Quarterly, 34(3): 487-502. https://doi.org/10.2307/25750688
- Stanton, J. M., Stam, K. R., Guzman, I. & Caledra, C. (2003). "Examining the linkage between organizational commitment and information security." Presented at the SMC '03 2003 IEEE International Conference on Systems, Man and Cybernetics, IEEE. 3: 2501-2506.
- Tenenhaus, M., Vinzi, V. E., Chatelin, Y. M. & Lauro, C. (2005). "PLS path modeling." Computational Statistics & Data Analysis, 48(1): 159-205. https://doi.org/10.1016/j.csda.2004.03.005
- Vance, A. & Siponen, M. (2012). "IS Security Policy Violations: A Rational Choice Perspective." Journal of Organizational and End User Computing, 24(1): 21-41. https://doi.org/10.4018/joeuc.2012010102
- Vroom, C. & Solms, von, R. (2004). "Towards information security behavioural compliance." Computers & Security, 23(3): 191-198. https://doi.org/10.1016/j.cose.2004.01.012
- Workman, M., Bommer, W. H. & Straub, D. (2008). "Security lapses and the omission of information security measures: A threat control model and empirical test." Computers in Human Behavior, 24(6): 2799-2816. https://doi.org/10.1016/j.chb.2008.04.005