참고문헌
- 김문식 2013. "자기주도학습능력과 지식공유의 관계에 대한 개인의 목표지향성과 조직 특성의 조절 효과," 한국기업경영학회 (20:4), pp. 249- 271.
- 신가희, 곽선화 2017. "지식은폐와 지식공유의 영향 요인과 관계에 관한 연구," 지식경영연구 (18:2), pp. 129-157. https://doi.org/10.15813/kmr.2017.18.2.007
- 신동준 2009. "처벌의 효과: 억제이론에 대한 비판적 고찰," 형사정책 (21:2), pp. 191-216. https://doi.org/10.36999/KJC.2009.21.2.191
- 장용선 2010. "조직문화 유형이 지식공유에 미치는 영향 분석," 대한경영학회지 (23:5), pp. 2793-2813.
- 황호민, 이상곤 2019. "팀 내외의 사회적 자본이 R&D 성과에 미치는 영향: 지식공유의 매개효과," 지식경영연구 (20:3), pp. 49-71 https://doi.org/10.15813/kmr.2019.20.3.004
- Ahmad, A., Bosua, R., and Scheepers, R. 2014. "Protecting organizational competitive advantage: a knowledge leakage perspective," Computers & Security (42), pp. 27-39. https://doi.org/10.1016/j.cose.2014.01.001
- Alavi, M., and Leidner, D. E. 2001. "Knowledge management and knowledge management systems: Conceptual foundations and research issues," MIS Quarterly (25:1), pp. 107-136. https://doi.org/10.2307/3250961
- Alexy, O., George, G., and Salter, A. J. 2013. "Cui bono? The selective revealing of knowledge and its implications for innovative activity," Academy of Management Review (38:2), pp. 270-291. https://doi.org/10.5465/amr.2011.0193
- Annansingh, F. 2012. "Exploring the Risks of Knowledge Leakage: An Information Systems Case Study Approach," New Research on Knowledge Management Models and Methods, IntechOpen.
- Argyres, N. S., and Silverman, B. S. 2004. "R&D, organization structure, and the development of corporate technological knowledge," Strategic Management Journal (25:8-9), pp. 929-958. https://doi.org/10.1002/smj.387
- Beccaria, C. 1963. On Crimes and Punishment, Macmillan, New York.
- Chesbrough, H. W. 2006. Open Innovation: The New Imperative for Creating and Profiting from Technology, Harvard Business Press.
- Comrey, A. L. 1973. A First Course in Factor Analysis, Academic Press, New York.
- Crossler, R. E., Johnston, A. C., and Lowry, P.B. 2013. "Future directions for behavioral information security research," Computers & Security (32), pp. 90-101. https://doi.org/10.1016/j.cose.2012.09.010
- D'Arcy, J., Hovav, A. and Galletta, D. 2009. "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach," Information Systems Research (20:1), pp. 79-98. https://doi.org/10.1287/isre.1070.0160
- Deci, E. L. and Ryan, R. M. 2000. "The "what" and "why" of goal pursuits: Human needs and the self-determination of behavior," Psychological Inquiry (11:4), pp. 227-268. https://doi.org/10.1207/S15327965PLI1104_01
- Deci, E. L., and Ryan, R. M. 2002. Overview of self-determination theory: An Organismic Dialectical Perspective. Handbook of self-determination research.
- Desouza, K. C. 2006. "Knowledge Security: An Interesting Research Space," Journal of Information Science & Technology (3:1), pp. 1-7.
- Durst, S., Aggestam, L., and Ferenhof, H. A. 2015. "Understanding knowledge leakage: A review of previous studies," Vine (45:4), pp. 568-586. https://doi.org/10.1108/VINE-01-2015-0009
- Eisenhardt, K. and Santos, F. 2000. "Knowledge-based view: a new theory of strategy?" Handbook of Strategy and Management (1:1), pp. 31-47.
- Ernst, and Young. 2003. Global Information Security Survey, New York.
- Gefen, D. Straub, D., and Boudreau, M. C. 2000. "Structural equation modeling and regression: Guidelines for research practice," Communications of the Association for Information Systems (4:1), article 7.
- Gibbs, J. P. 1975. "Crime, punishment, and deterrence," Southwestern Social Science Quartely (48:5), pp. 515-530.
- Grasmick, H. G., and Bursik Jr, R. J. 1990. "Conscience, significant others, and rational choice: Extending the deterrence model," Law and society review, pp. 837-861.
- Harrington, S. J. 1996. "The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions," MIS Quarterly (20:3), pp. 257-278. https://doi.org/10.2307/249656
- Hendriks, P. 1999. "Why share knowledge? The influence of ICT on the motivation for knowledge sharing," Knowledge and Process Management (6:2), pp. 91-100. https://doi.org/10.1002/(SICI)1099-1441(199906)6:2<91::AID-KPM54>3.0.CO;2-M
- Herath, T., and Rao, H. R. 2009a. "Protection motivation and deterrence: a framework for security policy compliance in organizations," European Journal of Information Systems (18:2), pp. 106-125. https://doi.org/10.1057/ejis.2009.6
- Herath, T., and Rao, H. R. 2009b. "Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness," Decision Support Systems (47:2), pp. 154-165. https://doi.org/10.1016/j.dss.2009.02.005
- Higgins, G., Wilson, A., and Fell, B. 2005. "An application of deterrence theory to software piracy," Journal of Criminal Justice and Popular Culture (12:3), pp. 166-184.
- Hu, Q., Xu, Z. and Dinev, T. 2011. "Does deterrence work in reducing information security policy abuse by employees?," Communications of the ACM (54:6), pp. 54-60. https://doi.org/10.1145/1953122.1953142
- Jennex, M. E and Durcikova. A. 2013. "Assessing knowledge loss risk," 46th Hawaii International Conference on System Sciences, pp. 3478-3487.
- Jiang, X., Li, M. and Gao, S. 2013. "Managing knowledge leakage in strategic alliances: The effects of trust and formal contracts," Industrial Marketing Management (42:6), pp. 983-991. https://doi.org/10.1016/j.indmarman.2013.03.013
- Johnston, M. M. and Finney, S. J. 2010. "Measuring basic needs satisfaction: Evaluating prev ious resea rch a nd conduct ing new psychometric evaluations of the Basic needs satisfaction in general scale," Contemporary Educational Psychology (35:4), pp. 280-296. https://doi.org/10.1016/j.cedpsych.2010.04.003
- Kankanhalli, A., Teo, H. H. and Tan, B. C. 2003. "An integrative study of information systems security effectiveness," International Journal of Information Management (23:2), pp. 139-154. https://doi.org/10.1016/S0268-4012(02)00105-6
- Kogut, B. and Zander, U. 1992. "Knowledge of the firm, combinative capabilities, and the replication of technology," Organization Science (3:3), pp. 383-397. https://doi.org/10.1287/orsc.3.3.383
- Kohn, A. 1993. Why incentive plans cannot work, Harvard Business Review 71.
- Manhart, M. and Thalmann, S. 2015. "Protecting organizational knowledge: a structured literature review," Journal of Knowledge Management (19:2), pp. 190-211. https://doi.org/10.1108/JKM-05-2014-0198
- Nagin, D. S. and Pogarsky, G. 2001. "Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence," Criminology (39:4), pp. 865-892. https://doi.org/10.1111/j.1745-9125.2001.tb00943.x
- Niemiec, C. P. and Ryan, R. M. 2009. "Autonomy, competence, and relatedness in the classroom: Applying self-determination theory to educational practice," School Field (7:2), pp. 133-144.
- Nonaka, I. and Takeuchi, H. 1995. The Knowledge - Creating Company: How Japanese Companies Create the Dynamics of Innovation, Oxford university press.
- Norman, P. M. 2002. "Protecting knowledge in strategic alliances: Resource and relational characteristics," The Journal of High Technology Management Research (13:2), pp. 177-202. https://doi.org/10.1016/S1047-8310(02)00050-0
- Pahnila, S., Siponen, M., and Mahmood, A. 2007. "Employees' behavior towards IS security policy compliance," In Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Hawaii, USA.
- Parker, H. 2012. "Knowledge acquisition and leakage in inter‐firm relationships involving new technology‐based firms," Management Decision (50:9), pp.1618-1633. https://doi.org/10.1108/00251741211266714
- Paternoster, R. 2010. "How much do we really know about criminal deterrence?" The journal of criminal law and criminology, pp. 765-824.
- Paternoster, R. and Simpson, S. 1996. "Sanction threats and appeals to morality: Testing a rational choice model of corporate crime," Law & Society Review (30), pp. 549-583. https://doi.org/10.2307/3054128
- Piquero, A. and Tibbetts, S. 1996. "Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending," Justice Quarterly (13:3), pp. 481-510. https://doi.org/10.1080/07418829600093061
- Pogarsky, G. and Piquero, A. R. 2004. "Studying the reach of deterrence: Can deterrence theory help explain police misconduct?" Journal of Criminal Justice (32:4), pp. 371-386. https://doi.org/10.1016/j.jcrimjus.2004.04.007
- Ritala, P., Husted, K., and Olander, H. 2018. "External knowledge sharing and radical innovation: the downsides of uncontrolled openness," Journal of Knowledge Management (22:5), pp. 1104-1123. https://doi.org/10.1108/JKM-05-2017-0172
- Ritala, P., Olander, H. and Michailova, S. 2015. "Knowledge sharing, knowledge leaking and relative innovation performance: An empirical study," Technovation (35), pp. 22-31. https://doi.org/10.1016/j.technovation.2014.07.011
- Roca, J. C. and Gagne, M. 2008. "Understanding e-learning continuance intention in the workplace: A self-determination theory perspective," Computer in human behavior (24:4), pp. 1585-1604. https://doi.org/10.1016/j.chb.2007.06.001
- Ryan, R. M. 1994. "Representations of relationships to teachers, parents, and friends as predictors of academic motivation and self-esteem," Journal of early adolescence (14), pp. 226-249. https://doi.org/10.1177/027243169401400207
- Ryan, R. M. and Deci, E. L. 2000. "Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being," American psychologist (55:1), pp. 68. https://doi.org/10.1037/0003-066X.55.1.68
- Ryan, R. M. and Deci, E. L. 2002. An overview of self-determination theory: An organismic dialectical perspective, Handbook of self-determination research. Rochester, NY: University of Rochester Press.
- Ryan, R. M., Patrick, H., Deci, E. L. and Williams, G. C. 2008. "Facilitating health behaviour change and its maintenance: Interventions based on self-determination theory," European Health Psychologist (10:1), pp. 2-5.
- Ryan, R. M., Rigby, C. S. and Przybylski, A. 2006. "The motivational pull of video games : A self-determination theory approach," Motivation and emotion (30:4), pp. 344-360. https://doi.org/10.1007/s11031-006-9051-8
- Silberman, M. 1976. "Toward a theory of criminal deterrence," American Sociological Review (41:3), pp. 442-461. https://doi.org/10.2307/2094253
- Siponen, M. and Vance, A. 2010. "Neutralization: new insights into the problem of employee information systems security policy violations," MIS Quarterly (34:3), pp. 487-502. https://doi.org/10.2307/25750688
- Siponen, M., Pahnila, S. and Mahmood, A. 2007. "Employees' adherence to information security policies: an empirical study," International Information Security Conference, pp. 133-144.
- Skinner, W. F. and Fream, A. M. 1997. "A social learning theory analysis of computer crime among college students," Journal of Research in Crime and Delinquency (34:4), pp. 495-518. https://doi.org/10.1177/0022427897034004005
- Straub, D. W. 1990. "Effective IS security: an empirical study," Information Systems Research (1:3), pp. 255-276. https://doi.org/10.1287/isre.1.3.255
- Teece, D. J. 1996. "Firm organization, industrial structure, and technological innovation," Journal of Economic Behavior & Organization (31:2), pp. 193-224. https://doi.org/10.1016/S0167-2681(96)00895-5
- Tittle, C. R. 1980. Sanctions and Social Deviance: The Question of Deterrence. New York, Praeger.
- Trevino, L. K. 1992. "Experimental Approaches to Studying Ethical-Unethical Behavior in Organizations," Business Ethics Quarterly (2:2), pp. 121-136. https://doi.org/10.2307/3857567
- Vayrynen, K., Hekkala, R. and Liias, T. 2013. "Knowledge protection challenges of social media encountered by organizations," Journal of Organizational Computing and Electronic Commerce (23:1-2), pp. 34-55. https://doi.org/10.1080/10919392.2013.748607
- Von Hirsch, A. 1999. Colloquium, Criminal deterrence and sentence severity: An Analysis of Recent Research. Hart Oxford.
- Wang, S. and Noe, R. A. 2010. "Knowledge sharing: A review and directions for future research," Human Resource Management Review (20:2), pp. 115-131. https://doi.org/10.1016/j.hrmr.2009.10.001
- Williams, G. C., McGregor, H. A. and Sharp, D. 2006. "Testing a self-determination theory intervention for motivating tobacco cessation: supporting autonomy and competence in a clinical trial," Health psychology (25:1), pp. 91-101. https://doi.org/10.1037/0278-6133.25.1.91
- Zhang, L., Smith, W. W., and Mcdowell, W. C. 2006. "Examining digital piracy: self-control, punishment, and self-efficacy," Information Resources Management Journal (22:1), pp. 24-44. https://doi.org/10.4018/irmj.2009010102