참고문헌
- Q. Hu, Z. Xu, T. Dinev & H. Ling. (2011). Does deterrence work in reducing information security policy abuse by employees?. Communications of the ACM, 54(6), 54-60. DOI: 10.1145/1953122.1953142
- J. Kim & J. Mou. (2020). Meta-analysis of Information Security Policy Compliance Based on Theory of Planned Behavior. Journal of Digital Convergence, 18(11), 169-176. DOI: 10.14400/JDC.2020.18.11.169
- W. A. Cram, J. D'Arcy & J. G. Proudfoot. (2019). Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Quarterly, 43(2), 525-554. DOI: 10.24251/hicss.2017.489
- S. Trang & B. Brendel. (2019). A meta-analysis of deterrence theory in information security policy compliance research. Information Systems Frontiers, 21(6), 1265-1284. DOI: 10.1108/ICS-09-2016-0073.
- K. M. Kuo, P. C. Talley & C. H. Huang. (2020). A Meta-analysis of the Deterrence Theory in Security-compliant and Security-risk Behaviors. Computers & Security, 101928. DOI: 10.1016/j.cose.2020.101928
- M. W. L. Cheung. & W. Chan. (2005). Meta-Analytic Structural Equation Modeling: A Two-Stage Approach. Psychological Methods, 10(1), 40-64. DOI: 10.1037/1082-989x.10.1.40
- I. Onwudiwe, J. Odo & E. Onyeozili. (2005). Deterrence Theory. In: Bosworth, M. (Ed.), Encyclopedia of Prisons & Correctional Facilities. Sage Publications, Inc, Thousand Oaks, CA, 234-238. DOI: 10.4135/9781412952514
- D. Shin. (2009). The Effect of Punishment: A Critique of Deterrence Theory. Korean Journal of Criminology, 21(2), 191-216. UCI: I410-ECN-0102-2012-320-002372416 https://doi.org/10.36999/KJC.2009.21.2.191
- J. D'Arcy & T. Herath. (2011). A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings. European Journal of Information Systems, 20(6), 643-658. DOI: 10.1057/ejis.2011.23
- I. Hwang & H. Lee. (2016). The Employee's Information Security Policy Compliance Intention: Theory of Planned Behavior, Goal Setting Theory, and Deterrence Theory Applied. Journal of Digital Convergence, 14(7), 155-166. DOI: 10.14400/JDC.2016.14.7.155
- J. Abed & H. R. Weistroffer. (2016). Understanding deterrence theory in security compliance behavior: a quantitative meta-analysis approach. SAIS 2016.
- K. H. Guo. (2013). Security-related behavior in using information systems in the workplace: a review and synthesis. Computers & Security, 32, 242-251. DOI: 10.1016/j.cose.2012.10.003
- J. Bok. (2020). An Study on Privacy Policy Research Trend : Focused on KCI Published. Journal of Digital Convergence, 18(4), 81-89. DOI: 10.14400/JDC.2020.18.4.081
- R. Rosenthal. (1979). The File Drawer Problem and Tolerance for Null Results. Psychological Bulletin, 86(3), 638-641. DOI: 10.1037/0033-2909.86.3.638
- K. H. Guo & Y. Yuan. (2012). The Effects of Multilevel Sanctions on Information Security Violations. Information & Management, 49(6), 320-326. DOI: 10.1016/j.im.2012.08.001
- F. J. Haeussinger & J. J. Kranz. (2013). Information Security Awareness: Its Antecedents and Mediating Effects on Security Compliant. 34th International Conference on Information Systems, Milan, Italy.
- B. T. Hanus. (2014). The Impact of Information Security Awareness of Compliance with Information Security Policies: A Phishing Perspective. unpublished doctoral dissertation, University of North Texas.
- S. J. Harrington. (1996). The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgements and Intentions. MIS Quarterly, 20(3), 257-278. DOI: 10.2307/249656
- S. Kinnunen. (2016). Exploring Determinants of Different Information Security Behaviors. unpublished doctoral dissertation, University of Jyvaskyla.
- M. Siponen & A. Vance. (2010). Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations. MIS Quarterly, 34(3), 487-502. DOI: 10.2307/25750688
- H. Li, J. Zhang, & R. Sarathy. (2010). Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory. Decision Support Systems, 48(4), 635-645. DOI: 10.1016/j.dss.2009.12.005
- W. Li & L. Cheng. (2013). Effects of Neutralization Techniques and Rational Choice Theory on Internet Abuse in the Workplace. Pacific Asia Conference on Information Systems, Jeju Island, South Korea.
- W. Arunothong. (2014). Three Research Essays on Propensity to Disclose Medical Information through Formal and Social Information Technologies. unpublished doctoral dissertation, University of Wisconsin-Milwaukee.
- A. Hovav & J. D'Arcy. (2012). Applying an Extended Model of Deterrence Across Cultures: An Investigation of Information Systems Misuse in the US and South Korea. Information & Management, 49(2), 99-110. DOI: 10.1016/j.im.2011.12.005
- X. Chen, D. Wu, L. Chen & J. K. L. Teng. (2018). Sanction severity and employees' information security policy compliance: investigating mediating, moderating, and control variables. Information & Management, 55(8), 1049-1060. DOI: 10.1016/j.im.2018.05.011.
- M. I. Merhi & P. Ahluwalia. (2019). Examining the impact of deterrence factors and norms on resistance to Information Systems Security. Computers in Human Behavior. 92, 37-46. DOI: 10.1016/j.chb.2018.10.031
- M. Rajab & A. Eydgahi. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security. 80, 211-223. DOI: 10.1016/j.cose.2018.09.016
- N. S. Safa, C. Maple, S. Furnell, M. A. Azad, C. Perera, M. Dabbagh & M. Sookhak. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems. 97, 587-597. DOI: 10.1016/j.future.2019.03.024