References
- L. Tredinnick, Digital information culture: the individual and society in the digital age, p.205, Amsterdam : Elsevier, 2008, pp.57-79.
- A. AlHogail, "Design and validation of information security culture framework", Computers in human behavior, Vol.49, pp.567-7575, Aug. 2015. DOI : https://doi.org/10.1016/j.chb.2015.03.054
- B. Khan, K. S. Alghathbar, S. I. Nabi & M. K. Khan, "Effectiveness of information security awareness methods based on psychological theories", African Journal of Business Management, Vol.5, No.26, pp.10862-10868, 2011.
- S. H. Hu, "Analysis of the impact of military organization's safety culture on safety behavior: Focusing on the mediating effect of safety leadership", Journal of Advances in Military Studies, Vol.3, No.2, pp.63-81, 2020. DOI : https://doi.org/10.37944/jams.v3i2.70
- R. W. Lee, I. H. Hwang & S. H. Hu, "Exploratory research of information security strategy focused on human factors", The Journal of General Education, Vol.6, No.2, pp.103-124, 2017. https://doi.org/10.24173/jge.2017.12.6.4
- M. L. Foulds, "Changes in locus of internal-external control: A growth group experience", Comparative Group Studies, Vol.2, No.3, pp.293-300, 1971. DOI : https://doi.org/10.1177/104649647100200303
- S. A. Stumpf & M. London, "Management promotions: Individual and organizational factors influencing the decision process", Academy of Management Review, Vol.6, No.4, pp.539-549, 1981. https://doi.org/10.5465/AMR.1981.4285668
- D. Kahneman & A. Tversky, Prospect theory: An analysis of decision under risk, Handbook, World Scientific, Singapore, pp.99-127.
- H. Shefrin & M. Statman, "The contributions of Daniel kahneman and Amos tversky", The Journal of Behavioral Finance, Vol.4, No.2, pp.54-58, 2003. DOI : https://doi.org/10.1207/S15427579JPFM0402_01
- D. VandeWalle, "Development and validation of a work domain goal orientation instrument", Educational and psychological measurement, Vol.57, No.6, pp.995-1015, 1997. DOI : https://doi.org/10.1177/0013164497057006009
- R. R. Blake & J. S. Mouton, "Management by Grid® principles or situationalism: Which?", Group and Organization Studies, Vol.6, No.4, pp.439-455, 1981. https://doi.org/10.1177/105960118100600404
- B. Bulgurcu, H. Cavusoglu & I. Benbasat, "Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness", MIS quarterly, Vol.34, No.3, pp.523-548, 2010. https://doi.org/10.2307/25750690
- M. Chan, I. Woon & A. Kankanhalli, "Perceptions of information security in the workplace: linking information security climate to compliant behavior", Journal of information privacy and security, Vol.1, No.3, pp.18-41, 2005. https://doi.org/10.1080/15536548.2005.10855772
- M. Siponen, M. A. Mahmood & S. Pahnila, "Employees' adherence to information security policies: An exploratory field study", Information and Management, 51, No.2, pp.217-224, 2014. DOI : https://doi.org/10.1016/j.im.2013.08.006
- P. Ifinedo, "Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition", Information and Management, Vol.51, No.1, pp.69-79, 2014. DOI : https://doi.org/10.1016/j.im.2013.10.001
- P. Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory", Computers and Security, Vol.31, No.1, pp.83-95, 2012. DOI : https://doi.org/10.1016/j.cose.2011.10.007
- Y. Zhao & M. Zhao, "WeChat Users' Information Protection Behavior Based on Prospect Theory", International Journal of Information and Education Technology, Vol.9, No.6, pp.390-395, 2019. DOI : https://doi.org/10.18178/ijiet.2019.9.6.1233
- T. Sommestad, H. Karlzen & J. Hallberg, "The theory of planned behavior and information security policy compliance", Journal of Computer Information Systems, Vol.59, No.4, pp.344-353, 2019. DOI : https://doi.org/10.1080/08874417.2017.1368421