Acknowledgement
본 연구자들은 초기 원고에 유익한 고견을 제안해주신 편집위원장님과 편집위원님, 그리고 세 분의 심사위원님들께 진심으로 감사의 마음을 전합니다. 더불어 본 연구자들은 설문조사에 도움을 제공해주신 상지대학교 컴퓨터공학과 박홍진 교수님과 교직과 이태상 교수님께 진심으로 감사의 마음을 전합니다.
References
- 김성영, 안승범, "블록체인 시스템 수용의도에 영향을 미치는 요인에 관한 연구: 물류기업을 중심으로", 한국물류학회지, 제28권, 제1호, 2018, pp. 71-85.
- 민진영, 김병수, "프라이버시 계산 모형을 적용한 SNS 지속 사용 의도에 대한 연구: 페이스북과 카카오톡 사례 중심으로", Information Systems Review, 제15권, 제1호, 2013, pp. 105-122.
- 서경진, 최지은, 김희웅, "정보보안 인력양성을 위한 탐색적 연구: 정부, 기업, 학계, 인력 관점 기반", 정보시스템연구, 제24권, 제2호, 2015, pp. 73-96 https://doi.org/10.5859/KAIS.2015.24.2.73
- 유석천, 이재우, 염정호, "정보보호 부문에 대한 투자모형에 관한 연구", 정보통신정책연구, 제8권, 제2호, 2001, pp. 17-48.
- 이동규, 이성훈, "정보통신 기술(ICT)을 활용한 물류 시스템의 변화", 한국정보기술학회지, 제16권, 제1호, 2018, pp. 19-24
- 이소현, 강일웅, 정윤혁, 김희웅, "사이버범죄 유형별 특징 분석 연구", Information Systems Review, 제21권, 제3호, 2019, pp. 1-26. https://doi.org/10.14329/isr.2019.21.3.001
- 장익진, 최병구, "위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석: 위험지각태도 프레임웍을 기반으로", 한 국전자거래학회지, 제19권, 제3호, 2014, pp. 65-89. https://doi.org/10.7838/jsebs.2014.19.3.065
- 최병구, "가치창조를 위한 기업자원관리: 전사적자원관리 구현을 기반으로", Information Systems Review, 제10권, 제3호, 2008, pp. 111-132.
- 최보미, 박민정, 채상미, "개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구", Information Systems Review, 제17권, 제3호, 2015, pp. 77-94 https://doi.org/10.14329/isr.2015.17.3.077
- 한국인터넷진흥원, 개인정보보호 지식수준체계 연구, 한국인터넷진흥원 연구보고서, 2013.
- 허경옥, "연령에 따른 소비자 집단별 소비자의 식 및 정보탐색, 활용과 소비행동 분석", 한국소비자학회, 제12권, 제4호, 2001, pp. 39-64.
- Ajzen, I. and M. Fishbein, Understanding Attitudes and Predicting Social Behavior, Prentice-Hall Inc, 1980.
- Aladwani, A. M., "Change management strategies for successful ERP implementation", Business Process Management Journal, Vol.7, No.3, 2001, pp. 266-275. https://doi.org/10.1108/14637150110392764
- Andersen, P. A., Nonverbal immediacy in interpersonal communication, In A. W. Siegman and S. Feldman (Eds.), Multichannel Integrations of Non-Verbal Behavior (pp. 1-36). Hillsdale, NJ: Erlbaum, 1985.
- Andersen, P. A., Nonverbal communication: Forms and functions (pp. 228-237), Mountain View, CA: Mayfield Publishing, 1999.
- Barclay, D., C. Higgins, and R. Thompson, "The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration", Technology Studies, Vol.2, No.2, 1995, pp. 285-309.
- Cohen, J., Statistical Power Analysis for the Behavioral Sciences, Lawrence Erlbaum Associates Inc., 1977.
- Dinev, T. and P. Hart, "An extended privacy calculus model for E-commerce transactions", Information Systems Research, Vol.17, No.1, 2006, pp. 61-80. https://doi.org/10.1287/isre.1060.0080
- Fishbein, M. and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Reading, Addison-Wesley, MA, 1975.
- Floyd, D. L., S. Prentice-Dunn, and R. W. Rogers, "A meta-analysis of research on protection motivation theory", Journal of Applied Social Psychology, Vol.30, No.2, 2000, pp. 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
- Fornell, C. and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error", Journal of Marketing Research, Vol.18, No.1, 1981, pp. 39-50. https://doi.org/10.1177/002224378101800104
- Ghazi, C., J. Nyland, R. Whaley, T. Rogers, J. Wera, and C. Henzman, "Social cognitive or learning theory use to improve self-efficacy in musculoskeletal rehabilitation: A systematic review and meta-analysis", Physiotherapy Theory and Practice, Vol.34, No.7, 2018, pp. 495-504. https://doi.org/10.1080/09593985.2017.1422204
- Hair Jr, J. F., G. T. M. Hult, C. Ringle, and M. Sarstedt, A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), Sage Publications, 2016.
- Hair Jr, J., Sarstedt, M., Hopkins, L., and G. Kuppelwieser, V., "Partial least squares structural equation modeling (PLS-SEM) An emerging tool in business research", European Business Review, Vol.26, No.2, 2014, pp. 106-121. https://doi.org/10.1108/EBR-10-2013-0128
- Halvorson, H. G. and E. T. Higgins, "Do you play to win-or to not lose?", Harvard Business Review, Vol.91, No.3, 2013, pp. 117-120.
- Herath, T. and Rao, H. R., "Protection motivation and deterrence: A framework for security policy compliance in organisations", European Journal of Information Systems, Vol.18, No.2, 2009, pp. 106-125. https://doi.org/10.1057/ejis.2009.6
- Kim, D. J., D. L. Ferrin, and H. R. Rao, "Trust and satisfaction, two stepping stones for successful E-Commerce relationships: A longitudinal exploration", Information Systems Research, Vol.20, No.2, 2009, pp. 237-257. https://doi.org/10.1287/isre.1080.0188
- Kimmel, A. J., Psychological Foundations of Marketing: The Keys to Consumer Behavior, Routledge, 2018.
- Lazarus, R. S., Emotion and Adoption, New York: Oxford Univ. Press, 1991.
- Li, H., T. Daugherty, and F. Biocca, "Characteristics of virtual experience in electronic commerce: A protocol analysis", Journal of Interactive Marketing, Vol.15, No.3, 2001, pp. 13-30. https://doi.org/10.1002/dir.1013
- Lim, S. H., "An empirical study on behavior and psychology concerning invoice disposal in the context of courier services: A comparative study on Korea and the U.S.", Asia Pacific Journal of Information Systems, Vol.28, No.2, 2018, pp. 133-153. https://doi.org/10.14329/apjis.2018.28.2.133
- Lim, S. H., D. J. Kim, Y. Hur, and K. S. Park, "An empirical study of the impacts of perceived security and knowledge on continuous intention to use mobile fintech payment services", International Journal of Human-Computer Interaction, Vol.35, No.2, 2019, pp. 886-898. https://doi.org/10.1080/10447318.2018.1507132
- Lim, S. H., J. Y. Sung, D. K. Kim, and D. J. Kim, "A study of consumers' perceived risk, privacy concern, information protection policy, and service satisfaction in the context of parcel delivery services", Asia Pacific Journal of Information Systems, Vol.27, No.3, 2017, pp. 156-175. https://doi.org/10.14329/apjis.2017.27.3.156
- Lu, G., X. Koufteros, and L. Lucianetti, "Supply chain security: A classification of practices and an empirical study of differential effects and complementarity", IEEE Transactions on Engineering Management, Vol.64, No.2, 2017, pp. 234-248. https://doi.org/10.1109/TEM.2017.2652382
- MacBlain, S., Learning Theories for Early Years Practice, SAGE, 2018.
- Malhotra, N. K., S. S. Kim, and J. Agarwal, "Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model", Information Systems Research, Vol.15, No.4, 2004, pp. 336-355. https://doi.org/10.1287/isre.1040.0032
- Min, H., "Blockchain technology for enhancing supply chain resilience", Business Horizons, Vol.62, No.1, 2019, pp. 35-45. https://doi.org/10.1016/j.bushor.2018.08.012
- Nunnally, J. C. and I. H. Bernstein, Psychometric Theory (3rd ed.), New York, NY: McGraw-Hill, 1994.
- Peter, J. and L. S. Tarpey, "A comparative analysis of three consumer decision strategies", Journal of Consumer Research, Vol.2, No.1, 1975, pp. 29-37. https://doi.org/10.1086/208613
- Podsakoff, P. M. and D. W., Organ, "Self reports in organizational research: Problems and prospects", Journal of Management, Vol.12, No.4, 1986, pp. 531-544 https://doi.org/10.1177/014920638601200408
- Rosenberg, M. J., "A structural theory of attitude dynamics", Public Opinion Quarterly, Vol.24, No.2, 1960, pp. 319-340. https://doi.org/10.1086/266951
- Sommestad, T., H. Karlzen, and J. Hallberg, "A meta-analysis of studies on protection motivation theory and information security behaviour", International Journal of Information Security and Privacy, Vol.9. No.1, 2015, pp. 26-46. https://doi.org/10.4018/IJISP.2015010102
- Vance, A., M. T. Siponen, and S. Pahnila, "Motivating IS security compliance: Insights from habit and protection motivation theory", Information & Management, Vol.49, No.3/4, 2012, pp. 190-198. https://doi.org/10.1016/j.im.2012.04.002
- Verdouw, C. N., R. M. Robbemond, T. Verwaart, J. Wolfert, and A. J. M. Beulens, "A reference architecture for IoT-based logistic information systems in Agri-Food supply chains", Enterprise Information Systems, Vol.12, No.7, 2018, pp. 755-779. https://doi.org/10.1080/17517575.2015.1072643
- Xu, H., "The effects of self-construal and perceived control on privacy concerns", Proceedings of the 28th Annual International Conference on Information Systems, Montreal, Canada, 2007, p. 125.
- Xu, H., T. Dinev, J. Smith, and P. Hart "Information privacy concerns: Linking individual perceptions with institutional privacy assurances", Journal of the Association for Information Systems, Vol.12, No.12, 2011, pp. 798-824. https://doi.org/10.17705/1jais.00281
- Yang, S., Y. Lu, S. Gupta, Y. Cao, and R. Zhang, "Mobile payment services adoption across time: An empirical study of the effects of behavioral beliefs, social influences, and personal traits", Computers in Human Behavior, Vol.28, No.1, 2012, pp. 129-142. https://doi.org/10.1016/j.chb.2011.08.019
- Yi, C., Z. Jiang, and I. Benbasat, "Enticing and engaging consumers via online product presentations: The effects of restricted interaction design", Journal of Management Information Systems, Vol.31, No.4, 2015, pp. 213-242. https://doi.org/10.1080/07421222.2014.1001270
- Zajonc R. B. and H. Marku, "Affective and cognitive factors in preference", Journal of Consumer Research, Vol.9, No.2, 1982, pp. 121-131. https://doi.org/10.1086/208905