<그림 1> Strauss and Corbin (1990)의 패러다임 모형
<그림 2> 패러다임 모형
<표 1> 참여자의 일반적 특성
<표 2> 코드 범주화
참고문헌
- 강한나, 김보름, 마이크로 트렌드 심리학, 미래의 창, 2016.
- 박상철, 이웅규, "근거이론을 활용한 멀티채널 사용자의 크로스오버 쇼핑행동이해," Information Systems Review, 제19권, 제2호, 2017, pp. 179-199. https://doi.org/10.14329/isr.2017.19.3.179
- 이웅규, "<튜토리얼> 비사용의 연구 주제와 연구 방법론," 정보시스템연구, 제24권, 제3호, 2015, pp.155-169.
- 이웅규, "정보기술 비사용의 결정요인과 동태적 성격의 규명: 근거이론방법론에 의한 질적연구," 정보시스템연구, 제27권, 제1호, 2018, pp. 1-20.
- 한국인터넷진흥원, 패스워드 선택 및 이용안내서, 2010.
- Akhawe, D., and Felt, A.P., "Alice in Warning Land: A Large-Scale Field Study of Browser Security Warning Effectiveness," Proceedings of USENIX Security Symposium, 2013, pp.257-272.
- Bravo-Lillo, C., Cranor, L.F., Komanduri, S., Schechter, S., and Sleeper, M., "Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It," Proceedings of Symposium on Usable Privacy and Security, 2014, pp.105-111.
- Bravo-Lillo, C., Cranor, L.F., Downs, J.S., and Komanduri, S., "Bridging the Gap in Computer Security Warnings: A Mental Model Approach," IEEE Security & Privacy Magazine, Vol.9, No.2, 2011, pp.18-26.
- Gaw, S., and Felten, E. W., "Password Management Strategies for Online Accounts," Proceedings of Symposium on Usable Privacy and Security, 2006, pp. 44-55.
- Ivan, I., Shadow Work, Salem, New Hampshire and London: Marion Boyars, 1981.
- Komanduri, S. Shay, R., Kelley, P.G., Mazurek, M.L., Bauer, L., Christin, N., Cranor, L.F., and Egelman, S., "Of Passwords and People: Measuring the Effect of Password-Composition Policies," Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2011, pp. 2595-2604.
- Lambert, C., Shadow Work: The Unpaid, Unseen Jobs That Fill Your Day, Counterpoint Press, 2015.
- Liu, Z., Hong, Y., and Pi, D., "A Large-Scale Study of Web Password Habits of Chinese Network Users," Journal of Software, Vol. 9, No. 2, 2014, pp. 293-297.
- Shay, R., Komanduri, S., Kelley, P.G., Leon, P.G., Mazurek, M.L., Bauer, L., Christin, N., and Cranor, L. F., "Encountering Stronger Password Requirements: User Attitudes and Behaviors", Proceedings of Symposium on Usable Privacy and Security, 2010, pp. 1-20.
- Stobert, E., and Biddle, R., "The Password Life Cycle: User Behavior in Managing Passwords," Proceedings of Symposium on Usable Privacy and Security, 2014, pp. 243-255.
- Strauss, A. and Corbin, J., Basics of Qualitative Research: Grounded Theory Procedures and Techniques, CA: Sage Publications, Inc., 1990.
- Strauss, A. L. and Corbin, J. M., Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, Thousand Oaks, CA: Sage., 1998.
- Wash, R., Rader, E., Berman, R., and Wellmer, Z., "Understanding Password Choices: How Frequently Entered Passwords Are Re-Used Across Websites," Proceedings of Symposium on Usable Privacy and Security, 2016, pp. 175-188.