References
- H. Liang & Y. Xue (2009). Avoidance of Information Technology Threats: A Theoretical Perspective. MIS Quarterly, 33(1), 71-90. DOI: 10.2307/20650279
- H. Chen & W. Li (2017). Mobile Device Users' Privacy Security Assurance Behavior: A Technology Threat Avoidance Perspective. Information & Computer Security, 25(3), 330-344. DOI: 10.1108/ICS-04-2016-0027
- W. A. Cram, J. F. Proudfoot & J. D'Arcy (2017). Organizational Information Security Policies: A Review and Research Framework. European Journal of Information Systems, 26, 605-641. DOI: 10.1057/s41303-017-0059-9
- H. Liang & Y. Xue (2010). Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective. Journal of the Association for Information Systems, 11(7), 394-413. DOI: 10.17705/1jais.00232
- A. R. Gillam & W. T. Foster (2020). Factors Affecting Risky Cybersecurity Behaviors by U.S. Workers: An Exploratory Study. Computers in Human Behavior, 108, 106319. DOI: 10.1016/j.chb.2020.106319
- V. Cho & W. H. Ip (2018). A Study of BYOD Adoption from the Lens of Threat and Coping Appraisal of Its Security Policy. Enterprise Information Systems, 12(6), 659-673. DOI: 10.1080/17517575.2017.1404132
- J. D'Arcy & P. B. Lowry (2019). Cognitive-affective Drivers of Employees' Daily Compliance with Information Security Policies: A Multilevel, Longitudinal Study. Information Systems Journal, 29, 43-69. DOI: 10.1111/isj.12173
- M. S. Yim (2018). An Exploratory Research on Factors Influence Perceived Compliance Cost and Information Security Awareness in Small and Medium Enterprise. Journal of the Korea Convergence Society, 9(9), 69-81. DOI: 10.15207/JKCS.2018.9.9.069
- C. Liu, N. Wang & H. Liang (2020). Motivating Information Security Policy Compliance: The Critical Role of Supervisor-Surbordinate Guanxi and Organizational Commitment. International Journal of Information Management, 54, 102152. DOI: 10.1016/j.ijinfomgt.2020.102152
- J. D'Arcy, A. Hovav & D. Galletta (2009). User Awareness of Security Countermeasures and Its Impact on Information Systems Misue: A Deterrence Approach. Information Systems Research, 20(1), 79-98. DOI: 10.1287/isre.1070.0160
- D. Q. Chen & H. Liang (2019). Wishful Thnking and IT Threat Avoidance: An Extension to the Technology Threat Avoidance Theory. IEEE Transactions on Engineering Management, 66(4), 552-567. DOI: 10.1109/TEM.2018.2835461
- D. Young, D. Carpenter & A. McLeod (2016). Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication. AIS Transactions on Replication Research, 2, 1-17. DOI: 10.17705/1atrr.00015
- N. A. G. Arachchilage & S. Love (2014). Security Awareness of Computer Users: A Phishing Threat Avoidance Perspective. Computers in Human Behavior, 38, 304-312. DOI: 10.1016/j.chb.2014.05.046
- E. Ikhalia, A. Serrano, D. Bell & P. Louvieris (2019). Online Social Netwokr Security Awareness: Mass Interpersonal Persuasion Using a Facebook App. Information Technology & People, 32(5), 1276-1300. DOI: 10.1108/ITP-06-2018-0278
- G. P. Z. Montesdioca & A. C. G. Macada (2015). Measuring User Satisfaction with Information Security Practices. Computers & Security, 48, 267-280. DOI: 10.1016/j.cose.2014.10.015
- S. Goel & I N. Chengalur-Smith (2010). Metrics for Characterizing the Form of Security Policies. Journal of Strategic Information Systems, 19, 281-295. DOI: 10.1016/j.jsis.2010.10.002
- M. S. Yim (2016). A Study on the Level of Perception about Information Security Countermeasures: Differences between Managers and Non-Managers. Korean Management Consulting Review, 16(4), 33-41.
- C. S. Carver & M. F. Scheier (1982). Control Theory: A Useful Conceptual Framework for Personality-Social, Clinical, and Health Psychology. Psychological Bulletin, 92(1), 111-135. DOI: 10.1037/0033-2909.92.1.111
- J. R. Edwards (1992). A Cybernetic Theory of Stress, Coping, and Well-being in Organizations. Academy of Management Review, 17(2), 238-273. DOI: 10.5465/amr.1992.4279536
- S. Boysen, B. Hewitt, D. Gibbs & A. McLeod (2019). Refining the Threat Calculus of Technology Threat Avoidance Theory. Communications of the Association for Information Systems, 45, 95-115. DOI: 10.17705/1CAIS.04505
- D. Carpenter, D. K. Young, P. Barrett & A. J. McLeod (2019). Refining Technology Threat Avoidance Theory. Communications of the Association for Information Sytems, 44, 380-407. DOI: 10.17705/1CAIS.04422
- A. Vance, B. B. Anderson, C. B. Kirwan & D. Earle (2014). Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG). Journal of the Association for Information Systems, 15(10, 679-722. DOI: 10.17705/1jais.00375
- J. Jansen & P. van Schaik (2017). Comparing Three Models to Explain Precautionary Online Behavioural Intentions. Information & Computer Security, 25(2), 165-180. DOI: 10.1108/ICS-03-2017-0018
- A. R. Gillam & A. M. Waite (2021). Gender Differences in Predictors of Technology Threat Avoidance. Information & Computer Security, 29(3), 393-412. DOI: 10.1108/ICS-01-2020-0008
- M. Chan, I. Woon & A. Kankanhalli (2005). Perceptions of Information Security in the Workplace: Linking Information Security Climate to Compliant Behavior. Journal of Information Privacy & Security, 1(3), 18-41. DOI: 10.1080/15536548.2005.10855772
- T. Herath & H. R. Rao (2009). Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of Information Systems, 18, 106-125. DOI: 10.1057/ejis.2009.6
- A. C. Johnston, M. Warkentin & M. Siponen (2015). An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric. MIS Quarterly, 39(1), 113-134. DOI: 10.25300/MISQ/2015/39.1.06
- V. Venkatesh, M. G. Morris, G. B. Davis & F. D. Davis (2003). User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27(3), 425-278. DOI: 10.2307/30036540
- J. Nunnally (1978). Psychometric Theory, 2 nd eds. New York: McGraw-Hill.
- M. S. Yim (2018). Factor Analysis for Exploratory Research in the Distribution Science Field. Journal of Distribution Science, 13(9), 103-112. DOI: 10.15722/jds.13.9.201509.103
- M. S. Yim (2019). A Study on Factor Analytical Methods and Procedures for PLS-SEM (Partial Least Squares Structural Equation Modeling). Journal of Industrial Distribution & Business, 10(5), 7-20. DOI: 10.13106/ijidb.2019.vol10.no5.7.
- D. Harman (1976). A Single Factor Test of Common Method Variance. Journal of Psychology, 35, 359-379.
- C. M. Fuller, M. J. Simmering, G. Atinc, Y. Atinc & B. J. Babin (2016). Common Methods Variance Detection in Business Research. Journal of Business Research, 69, 3192-3198. DOI: 10.1016/j.jbusres.2015.12.008
- J. F. Hair, G. T. M. Hult, G. Ringle & M. Sarstedt (2016). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM), 2 nd eds. Thousand Oaks: Sage.
- J. Cohen (1988). Statistical Power Analysis for the Behavioral Sciences, Hillside, NJ: Lawrence Erlbaum.