참고문헌
- 유인진, 박도형 "중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구," 정보시스템연구, 제27권, 제1호, 2018, pp. 171-191.
- 황인호, 김승욱, "조직원의 정보보안 관련 업무 스트레스에 대한 억제 및 업무대처에 대한 연구: 금융 비즈니스를 중심으로," e-비즈니스연구, 제18권, 제3호, 2017, pp. 147-165. https://doi.org/10.15719/GEBA.18.3.201706.147
- 황인호, 김상현, "SCO Framework 을 적용한 조직과 조직원의 정보보안 준수 관계 연구," 정보시스템연구, 제28권, 제4호, 2019, pp. 105-129.
- Alniacik, E., Alniacik, U., Erat, S., and Akcin, K., "Does Person - Organization Fit Moderate the Effects of Affective Commitment and Job Satisfaction on Turnover Intentions?," Procedia-Social and Behavioral Sciences, Vol. 99, 2013, pp. 274-281. https://doi.org/10.1016/j.sbspro.2013.10.495
- Andrews, M. C., Baker, T., and Hunt, T. G., "Values and Person-Organization Fit: Does Moral Intensity Strengthen Outcomes?," Leadership & Organization Development Journal, Vol. 32, No.1, 2011, pp. 5-19. https://doi.org/10.1108/01437731111099256
- Ayyagari, R., Grover, V., and Purvis, R., "Technostress: Technological Antecedents and Implications," MIS Quarterly, Vol. 35, No. 4, 2011, pp. 831-858. https://doi.org/10.2307/41409963
- Brod, C., Technostress: The Human Cost of the Computer Revolution. Reading, MA: Addison-Wesley, 1984.
- Bulgurcu, B., Cavusoglu, H., and Benbasat, I., "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness," MIS Quarterly, Vol. 34, No. 3, 2010, pp. 523-548. https://doi.org/10.2307/25750690
- Cable, D. M., and Judge, T. A., "Person-Organization Fit, Job Choice Decisions, and Organizational Entry," Organizational Behavior and Human Decision Processes, Vol. 67, No. 3, 1996, pp. 294-311. https://doi.org/10.1006/obhd.1996.0081
- Chen, Y., Ramamurthy, K., and Wen, K. W., "Organizations' Information Security Policy Compliance: Stick or Carrot Approach?," Journal of Management Information Systems, Vol. 29, No.3, 2012, pp. 157-188. https://doi.org/10.2753/MIS0742-1222290305
- D'Arcy, J., Herath, T., and Shoss, M. K., "Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective," Journal of Management Information Systems, Vol. 31, No. 2, 2014, pp. 285-318. https://doi.org/10.2753/MIS0742-1222310210
- D'Arcy, J., Hovav, A., and Galletta, D., "User Awareness of Security Countermeasures and its Impact on Information Systems Misuse: A Deterrence Approach," Information Systems Research, Vol. 20, No. 1, 2009, pp.79-98. https://doi.org/10.1287/isre.1070.0160
- D'Arcy, J., and Teh, P. L., "Predicting Employee Information Security Policy Compliance on a Daily Basis: The Interplay of Security-Related Stress, Emotions, and Neutralization," Information & Management, Vol. 56, No. 7, 2019, 103151. https://doi.org/10.1016/j.im.2019.02.006
- Dawson, J. F., "Moderation in Management Research: What, Why, When and How," Journal of Business and Psychology, Vol. 29, No. 1, 2014, pp. 1-19. https://doi.org/10.1007/s10869-013-9308-7
- Fornell, C., and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.1177/002224378101800104
- French, J. R. P., Caplan, R. D., and Harrison, R. V., The Mechanisms of Job Stress and Strain. New York: Wiley, 1982.
- Fuglseth, A. M., and Sorebo, O., "The Effects of Technostress within the Context of Employee Use of ICT," Computers in Human Behavior, Vol. 40, 2014, pp. 161-170. https://doi.org/10.1016/j.chb.2014.07.040
- Galluch, P. S., Grover, V., and Thatcher, J. B., "Interrupting the Workplace: Examining Stressors in an Information Technology Context," Journal of the Association for Information Systems, Vol. 16, No. 1, 2015, pp. 1-47. https://doi.org/10.17705/1jais.00387
- Gaudioso, F., Turel, O., and Galimberti, C., "The Mediating Roles of Strain Facets and Coping Strategies in Translating Techno-Stressors into Adverse Job Outcomes," Computers in Human Behavior, Vol. 69, 2017, pp. 189-196. https://doi.org/10.1016/j.chb.2016.12.041
- Grandviewresearch, Cyber Security Market Size, Share & Trends Analysis Report By Component, By Security Type, By Solution, By Service, By Deployment, By Organization, By Application, And Segment Forecasts, 2019 - 2025, 2019.
- Guo, K. H., and Yuan, Y., "The Effects of Multilevel Sanctions on Information Security Violations: A Mediating Model," Information & Management, Vol. 49, No. 6, 2012, pp. 320-326. https://doi.org/10.1016/j.im.2012.08.001
- Guo, K. H., Yuan, Y., Archer, N. P., and Connelly, C. E., "Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model," Journal of Management Information Systems, Vol. 28, No. 2, 2011, pp. 203-236. https://doi.org/10.2753/MIS0742-1222280208
- Herath, T., and Rao, H. R., "Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness," Decision Support Systems, Vol. 47, No. 2, 2009, pp. 154-165. https://doi.org/10.1016/j.dss.2009.02.005
- Hung, W. H., Chen, K., and Lin, C. P., "Does the Proactive Personality Mitigate the Adverse Effect of Technostress on Productivity in the Mobile Environment?," Telematics and Informatics, Vol. 32, No. 1, 2015, pp. 143-157. https://doi.org/10.1016/j.tele.2014.06.002
- Hwang, I., and Cha, O., "Examining Technostress Creators and Role Stress as Potential Threats to Employees' Information Security Compliance," Computers in Human Behavior, Vol. 81, 2018, pp. 282-293. https://doi.org/10.1016/j.chb.2017.12.022
- Hwang, I., Kim, D., Kim, T., and Kim, S., "Why Not Comply with Information Security? An Empirical Approach for the Causes of Non-compliance," Online Information Review, Vol. 41, No. 1, 2017, pp.2-18. https://doi.org/10.1108/OIR-11-2015-0358
- Hwang, I. H., and Lee, H. Y., "The Employee's Information Security Policy Compliance Intention: Theory of Planned Behavior, Goal Setting Theory, and Deterrence Theory Applied," Journal of Digital Convergence, Vol. 14, No. 7, 2016, pp. 155-166. https://doi.org/10.14400/JDC.2016.14.7.155
- Hwang, I., Wakefield, R., Kim, S., and Kim, T., "Security Awareness: The First Step in Information Security Compliance Behavior," Journal of Computer Information Systems, 2019, pp. 1-12.
- Jena, R. K., "Technostress in ICT Enabled Collaborative Learning Environment: An Empirical Study among Indian Academician," Computers in Human Behavior, Vol. 51, 2015, pp. 1116-1123. https://doi.org/10.1016/j.chb.2015.03.020
- Kristof, A. L., "Person-Organization Fit: An Integrative Review of its Conceptualizations, Measurement, and Implications," Personnel Psychology, Vol. 49, 1996, pp. 1-49. https://doi.org/10.1111/j.1744-6570.1996.tb01790.x
- Kristof-Brown, A. L., Zimmerman, R. D., Johnson, E. C., and Henry, B., "Consequences of Individuals' Fit at Work: A Meta-Analysis of Person-Job, Person-Organization, Person-Group, and Person-Supervisor Fit," Personnel Psychology, Vol. 58, No. 2, 2005, pp. 281-342. https://doi.org/10.1111/j.1744-6570.2005.00672.x
- Lauver, K. J., and Kristof-Brown, A., "Distinguishing Between Employees' Perceptions of Person-Job and Person-Organization Fit," Journal of Vocational Behavior, Vol. 59, No. 3, 2001, pp. 454-470. https://doi.org/10.1006/jvbe.2001.1807
- Little, T. D., Card, N. A., Bovaird, J. A., Preacher, K. J., and Crandall, C. S., "Structural Equation Modeling of Mediation and Moderation with Contextual Factors," Modeling Contextual Effects in Longitudinal Studies, Vol. 1, 2007, pp. 207-230.
- Loch, K. D., Carr, H. H., and Warkentin, M. E., "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly, Vol. 16, No. 2, 1992, pp.173-186. https://doi.org/10.2307/249574
- Netemeyer, R. G., Boles, J. S., McKee, D. O., and McMurrian, R., "An Investigation into the Antecedents of Organizational Citizenship Behaviors in a Personal Selling Context," Journal of Marketing, Vol. 61, No. 3, 1997, pp. 85-98. https://doi.org/10.1177/002224299706100107
- Nunnally, J. C., Psychometric theory (2nd ed.). New York: McGraw-Hill, 1978.
- Oh, S. T., and Park, S., "A Study of the Connected Smart Worker's Techno-stress," Procedia Computer Science, Vol. 91, 2016, pp. 725-733. https://doi.org/10.1016/j.procs.2016.07.065
- Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P., "Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended Remedies," Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903. https://doi.org/10.1037/0021-9010.88.5.879
- Ragu-Nathan, T. S., Tarafdar, M., Ragu-Nathan, B. S., and Tu, Q., "The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation," Information Systems Research, Vol. 19, No. 4, 2008, pp. 417-433. https://doi.org/10.1287/isre.1070.0165
- Ruiz-Palomino, P., and Martinez-Canas, R., "Ethical Culture, Ethical Intent, and Organizational Citizenship Behavior: The Moderating and Mediating Role of Person-Organization Fit," Journal of Business Ethics, Vol. 120, No. 1, 2014, pp. 95-108. https://doi.org/10.1007/s10551-013-1650-1
- Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., and Sookhak, M., "Deterrence and Prevention Based Model to Mitigate Information Security Insider Threats in Organisations," Future Generation Computer Systems, Vol. 97, 2019, pp.587-597. https://doi.org/10.1016/j.future.2019.03.024
- Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., and Herawan, T., "Information Security Conscious Care Behaviour Formation in Organizations," Computers and Security, Vol. 53, pp. 65-78, 2015. https://doi.org/10.1016/j.cose.2015.05.012
- Safa, N. S., Von Solms, R., and Futcher, L., "Human Aspects of Information Security in Organisations," Computer Fraud & Security, Vol. 2016, No. 2, 2016, pp. 15-18. https://doi.org/10.1016/S1361-3723(16)30017-3
- Siponen, M., Pahnila, S., and Mahmood, M. A., "Compliance with Information Security Policies: An Empirical Investigation," Computer, Vol. 43, No. 2, 2010, pp.64-71. https://doi.org/10.1109/MC.2010.35
- Sommestad, T., Hallberg, J., Lundholm, K., and Bengtsson, J., "Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies," Information Management & Computer Security, Vol. 22, No. 1, 2014, pp. 42-75. https://doi.org/10.1108/IMCS-08-2012-0045
- Steinbart, P. J., Raschke, R. L., Gal, G., and Dilla, W. N., "The Influence of a Good Relationship between the Internal Audit and Information Security Functions on Information Security Outcomes," Accounting, Organizations and Society, Vol. 71, 2018, pp. 15-29. https://doi.org/10.1016/j.aos.2018.04.005
- Tarafdar, M., Bolman Pullins, E., and Ragu-Nathan, T. S., "Examining Impacts of Technostress on the Professional Salesperson's Behavioral Performance," Journal of Personal Selling & Sales Management, Vol. 34, No. 1, 2014, pp. 51-69. https://doi.org/10.1080/08853134.2013.870184
- Tarafdar, M., Pullins, E. B., and Ragu-Nathan, T. S., "Technostress: Negative Effect on Performance and Possible Mitigations," Information Systems Journal, Vol. 25, No. 2, 2015, pp. 103-132. https://doi.org/10.1111/isj.12042
- Tarafdar, M., Tu, Q., Ragu-Nathan, B. S., and Ragu-Nathan, T. S., "The Impact of Technostress on Role Stress and Productivity," Journal of Management Information Systems, Vol. 24, No. 1, 2007, pp. 301-328. https://doi.org/10.2753/MIS0742-1222240109
- Tarafdar, M., Tu, Q., Ragu-Nathan, T. S., and Ragu-Nathan, B. S., "Crossing to the Dark Side: Examining Creators, Outcomes, and Inhibitors of Technostress," Communications of the ACM, Vol. 54, No. 9, 2011, pp. 113-120. https://doi.org/10.1145/1995376.1995403
- Valentine, S., Godkin, L., and Lucero, M., "Ethical Context, Organizational Commitment, and Person-Organization Fit," Journal of Business Ethics, Vol. 41, No. 4, 2002, pp. 349-360. https://doi.org/10.1023/A:1021203017316
- Vance, A., Siponen, M., and Pahnila, S., "Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory," Information & Management, Vol. 49, No. 3, 2012, pp. 190-198. https://doi.org/10.1016/j.im.2012.04.002
- Verizon, Verizon 2019 Data Breach Investigations Report, 2019.
- West, R., "The Psychology of Security," Communications of the ACM, Vol. 51, No. 4, 2008, pp. 34-40. https://doi.org/10.1145/1330311.1330320
- Wheeler, A. R., Coleman Gallagher, V., Brouer, R. L., and Sablynski, C. J., "When Person-Organization (mis) Fit and (dis) Satisfaction Lead to Turnover: The Moderating Role of Perceived Job Mobility," Journal of Managerial Psychology, Vol. 22, No. 2, 2007, pp. 203-219. https://doi.org/10.1108/02683940710726447
- Wixom, B. H., and Watson, H. J., "An Empirical Investigation of the Factors Affecting Data Warehousing Success," MIS Quarterly, Vol. 25, No. 1, 2001, pp. 17-41. https://doi.org/10.2307/3250957
- Yan, Z., Guo, X., Lee, M. K., and Vogel, D. R., "A Conceptual Model of Technology Features and Technostress in Telemedicine Communication," Information Technology & People, Vol. 26, No. 3, 2013, pp. 283-297. https://doi.org/10.1108/ITP-04-2013-0071