Acknowledgement
이 논문은 2022학년도 충북대학교 학술연구영역 사업의 연구비 지원에 의하여 연구 되었음.
References
- Agarwal, R. and E. Karahanna, "Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage", MIS quarterly, Vol.24, No.4, 2000, pp. 665-694. https://doi.org/10.2307/3250951
- Ahn, S. M., J. Y. Jang, J. D. Kim, and B. S. Kim, "Factors affecting the intention to invade privacy on social network service", Information Systems Review, Vol.16, No.2, 2014, 1-23.
- Ainley, M. and J. Ainley, "Student engagement with science in early adolescence: The contribution of enjoyment to students' continuing interest in learning about science", Contemporary Educational Psychology, Vol.36, No.1, 2011, 4-12. https://doi.org/10.1016/j.cedpsych.2010.08.001
- Ajzen, I., "Constructing a TPB questionnaire: Conceptual and methodological considerations", 2002, Available at http://www.uni-bielefeld.de/ikg/zick/ajzen%20construction%20a%20tpb%20questionnaire.pdf.
- Akers, R. L., Deviant behavior: A social learning approach (2nd Ed.), Wadsworth, California, 1973.
- Antil, J. H., "Conceptualization and operationalization of involvement", Advances in Consumer Research, Vol.11, No.1, 1984, pp. 203-209.
- Bandura, A., "Self-efficacy: Toward a unifying theory of behavioral change", Psychological review, Vol.84, No.2, 1977, pp. 191-215. https://doi.org/10.1037/0033-295X.84.2.191
- Bandura, A., "Self-efficacy mechanism in human agency", American Psychologist, Vol.37, No.2, 1982, pp. 122-147. https://doi.org/10.1037/0003-066X.37.2.122
- Bandura, A., Social foundations of thought and action: A social cognitive theory, Prentice-Hall, New Jersey, 1986.
- Belanger, F., J. S. Hiller, and W. J. Smith, "Trustworthiness in electronic commerce: The role of privacy, security, and site attributes", The Journal of Strategic Information Systems, Vol.11, No.3-4, 2002, pp. 245-270. https://doi.org/10.1016/S0963-8687(02)00018-5
- Blackwell, C., "A security architecture to protect against the insider threat from damage, fraud and theft", In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, ACM, 2009, p. 45.
- Bloch, P. H., "An exploration into the scaling of consumer's involvement with a product class", Advances in Consumer Research, Vol.8, No.1, 1981, pp. 61-65.
- Broussard, S. C. and M. E. B. Garrison, "The relationship between classroom motivation and academic achievement in elementary school-aged children", Family and Consumer Sciences Research Journal, Vol.33, No.2, 2004, pp. 106-120. https://doi.org/10.1177/1077727X04269573
- Byeon, Y. G., Consideration of teaching and learning theories (2nd Ed.), Hakjisa, Seoul 2005. (in Korean).
- Carroll, J. M. and J. C. Thomas, "Fun", ACM SIGCHI Bulletin, Vol.19, No.3, 1988, pp. 21-24. https://doi.org/10.1145/49108.1045604
- Childers, T. L., C. L. Carr, J. Peck, and S. Carson, "Hedonic and utilitarian motivations for online retail shopping behavior", Journal of Retailing, Vol.77, No.4, 2002, pp. 511-535. https://doi.org/10.1016/S0022-4359(01)00056-2
- Chin, W. W., "The partial least squares approach to structural equation modeling", Modern Methods for Business Research, Vol.295, No.2, 1998, pp. 295-336.
- Cho, K. I., "Track 4: The research for the leveles and moral of teenagers in cyber space lncluding the development of evalutation methods for them", Korean Association of Computer Education, Vol.17, No.2, 2013, pp. 151-156.
- Chu, B. W., Information ethics education, Ulyuck, Seoul, 2001. (in Korean)
- Chu, B. W., "Definition of information ethics and access", Korea Communications Standards Commission, 2003. (in Korean)
- Compeau, D. R. and C. A. Higgins, "Computer self-efficacy: Development of a measure and initial test", MIS quarterly, Vol.19, No.2, 1995, pp. 189-211. https://doi.org/10.2307/249688
- Conger, S., J. H. Pratt, and K. D. Loch, "Personal information privacy and emerging technologies", Information Systems Journal, Vol.23, No.5, 2013, pp. 401-417. https://doi.org/10.1111/j.1365-2575.2012.00402.x
- Deci, E. L., Intrinsic Motivation, Plenum Press, New York, 1975.
- Deci, E. L. and R. M. Ryan, "The general causality orientations scale: Self-determination in personality", Journal of Research in Personality, Vol.19, No.2, 1985, pp. 109-134. https://doi.org/10.1016/0092-6566(85)90023-6
- Ellison, N. B., C. Steinfield, and C. Lampe, "The benefits of Facebook "Friends:" Social capital and college students' use of online social network sites", Journal of Computer-Mediated Communication, Vol.12, 2007, pp. 1143-1168, Available at https://doi.org/10.1111/j.1083-6101.2007.00367.x.
- Falk, R. F. and N. B. Miller, A Primer for Soft Modeling, University of Akron Press, Ohio, 1992.
- Fornell, C. and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error", Journal of Marketing Research, Vol.18, No.1, 1981, pp. 39-50. https://doi.org/10.1177/002224378101800104
- Gefen, D. and D. Straub, "A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example", Communications of the Association for Information Systems, Vol.16, No.1, 2005, pp. 91-109.
- Gottfried, A. E., "Academic intrinsic motivation in young elementary school children", Journal of Educational Psychology, Vol.82, No.3, 1990, pp. 525-538. https://doi.org/10.1037/0022-0663.82.3.525
- Greenwald, A. G. and C. Leavitt, "Audience involvement in advertising: Four levels", Journal of Consumer Research, Vol.11, No.1, 1984, pp. 581-592. https://doi.org/10.1086/208994
- Hidi, S., "Interest and its contribution as a mental resource for learning", Review of Educational Research, Vol.60, No.4, 1990, pp. 549-571. https://doi.org/10.3102/00346543060004549
- Hidi, S. and K. A. Renninger, "The four-phase model of interest development", Educational Psychologist, Vol.41, No.2, 2006, pp. 111-127. https://doi.org/10.1207/s15326985ep4102_4
- Hsu, M. H. and C. M. Chiu, "Internet self-efficacy and electronic service acceptance", Decision Support Systems, Vol.38, No.3, 2004, pp. 369-381. https://doi.org/10.1016/j.dss.2003.08.001
- Ifinedo, P., "Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition", Information & Management, Vol.51, No.1, 2014, pp. 69-79. https://doi.org/10.1016/j.im.2013.10.001
- Ivanov, A. V., Y. V. Chelysheva, A. G. Akhtyan, V. A. Vishnyakova, and V. P. Sorikhina, "Ethical concepts of pedagogy of consciousness as a foundation for the development of the school for the future", Astra Salvensis, Vol.6, No.S, 2018, pp. 453-462.
- Kim, T. and M. Kang, "Measuring the effectiveness of teaching and actual condition of internet ethics of the undergraduate students", Journal of Information and Communication Convergence Engineering, Vol.14, No.5, 2010, pp. 1257-1269.
- Kitkowska, A., M. Warner, Y. Shulman, E. Wastlund, and L. A. Martucci, "Enhancing privacy through the visual design of privacy notices: Exploring the interplay of curiosity, control and affect", In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 2020, pp. 437-456.
- Koo, D. M. and S. H. Ju, "The interactional effects of atmospherics and perceptual curiosity on emotions and online shopping intention", Computers in Human Behavior, Vol.26, No.3, 2010, pp. 377-388. https://doi.org/10.1016/j.chb.2009.11.009
- Korea Communications Standards Commission, "Manuals on Violation of Rights in the Cyberspace", 2012, Available at https://www.kocsc.or.kr/02_infoCenter/Edu_View.php?ko_board=edu&ba_id=5958. (in Korean)
- Korea Internet and Security Agency, "Survey Report on Internet Ethical Culture", 2011, Available at http://isis.kisa.or.kr/board/?pageId=060100&bbsId=7&itemId=786&pageIndex=3. (in Korean)
- Korea Internet and Security Agency, "Survey on Information Security (Individual), 2014, Available at Retrieved from http://isis.kisa.or.kr/board/?pageId=060200&bbsId=15&itemId=49&pageIndex=1. (in Korean)
- Krapp, A., "Structural and dynamic aspects of interest development: Theoretical considerations from an ontogenetic perspective", Learning and Instruction, Vol.12, No.4, 2002, pp. 383-409. https://doi.org/10.1016/S0959-4752(01)00011-1
- Lee, I., "Stealing one's personal information has become a daily thing", Hankyung news agency, June 7, 2020, Available at https://www.hankyung.com/society/article/2020060798271. (in Korean)
- Lee, J. H. and S. C. An, "A comparative study on the legal system of cyberbullying", Dispute Resolution Studies Review, Vol.11, No.1, 2013, pp. 133-157. (in Korean) https://doi.org/10.16958/DRSR.2013.11.1.133
- Lepper, M. R. and D. Green, The Hidden Costs of Reward: New Perspectives on the Psychology of Human Behavior, Erlbaum, New York, 1978.
- Litman, J. A. and C. D. Spielberger, "Measuring epistemic curiosity and its diversive and specific components", Journal of Personality Assessment, Vol.80, No.1, 2003, pp. 75-86. https://doi.org/10.1207/S15327752JPA8001_16
- Loewenstein, G., "The psychology of curiosity: A review and reinterpretation", Psychological Bulletin, Vol.116, No.1, 1994, p. 75.
- Noh, D. I. and W. Choung, "Changing concept of privacy in cyberspace and the legal response thereto", Kyung Hee Law Journal, Vol.45, No.4, 2010, pp. 181-218. (in Korean)
- Nunnally, J. C., Psychometric Theory (2nd Ed.), McGraw-Hill, New York, 1987.
- Oh, T. W. and J. Y. Yu, "Changing concept of privacy in social networking service environment", Information and Communications Policy, Vol.23, No.4, 2011, pp. 26-42. (in Korean)
- Personal Information Protection Commission (PIPC), "Personal Information Protection 2019 Survey", 2019, Available at Retrieved from https://www.korea.kr/archive/expDocView.do?docId=39046. (in Korean)
- Personal Information Protection Commission (PIPC), "Statistical Cases of Personal Information Intrusion", 2022, Available at https://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1366. (in Korean)
- Pizam, A., Y. Neumann, and A. Reichel, "Tourist satisfaction: Uses and misuses", Annals of Tourism Research, Vol.6, No.2, 1979, pp. 195-197. https://doi.org/10.1016/0160-7383(79)90146-4
- Renninger, A., S. Hidi, and A. Krapp, The Role of Interest in Learning and Development, Psychology Press, New York, 2014.
- Schiefele, U., "Interest, learning, and motivation", Educational Psychologist, Vol.26, No.3-4, 1991, pp. 299-323. https://doi.org/10.1080/00461520.1991.9653136
- Schiefele, U., "Interest and learning from text", Scientific Studies of Reading, Vol.3, No.3, 1999, pp. 257-279. https://doi.org/10.1207/s1532799xssr0303_4
- Sherif, M. and H. Cantril, The Psychology of ego-involvements: Social Attitudes and Identifications, Wiley, New York, 1947.
- Smith, H. J., S. J. Milberg, and S. J. Burke, "Information privacy: Measuring individuals' concerns about organizational practices", MIS quarterly, Vol.20, No.2, 1996, pp. 167-196. https://doi.org/10.2307/249477
- Son, M. J., "Current state of cyberbullying and countermeasures in Korea", Internet & Security Focus, Vol.3, 2013, pp. 6-22. (in Korean)
- Sung, D. K., D. H. Kim, Y. S. Lee, and S. W. Lim, "A study on the cyber-violence induction factors of teenagers: Focused on individual inclination, cyber violence damage experience, and moral consciousness", Journal of Cybercommunication Academic Society, Vol.19, 2006, pp. 79-129. (in Korean)
- Taddicken, M., "The 'privacy paradox' in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure", Journal of Computer-Mediated Communication, Vol.19, 2014, pp. 248-273, Available at https://doi.org/10.1111/jcc4.12052.
- Teo, H. H., K. K. Wei, and I. Benbasat, "Predicting intention to adopt interorganizational linkages: An institutional perspective", MIS quarterly, Vol.27, No.1, 2003, pp. 19-49. https://doi.org/10.2307/30036518
- Thompson, R., D. W. Barclay, and C. A. Higgins, "The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration", Technology Studies, Vol.2, No.2, 1995, pp. 284-324.
- Turner Jr, S. A. and P. J. Silvia, "Must interesting things be pleasant? A test of competing appraisal structures", Emotion, Vol.6, No.4, 2006, pp. 670-674. https://doi.org/10.1037/1528-3542.6.4.670
- Van der Heijden, H., "User acceptance of hedonic information systems", MIS quarterly, Vol.28, No.4, 2004, pp. 695-704. https://doi.org/10.2307/25148660
- Venkatesh, V., "Creation of favorable user perceptions: Exploring the role of intrinsic motivation", MIS quarterly, Vol.23, No.2, 1999, pp. 239-260. https://doi.org/10.2307/249753
- Warren, S. D. and L. D. Brandeis, "The right to privacy", Harvard Law Review, Vol.4, No.5, 1890, pp. 193-220. https://doi.org/10.2307/1321160
- Westin, A. F., Privacy and Freedom, Atheneum, New York, 1967.
- Won, J. and D. Seo, "Self-disclosure and cyberbullying on SNS", Information Systems Review, Vol.19, No.1, 2017, pp. 1-23. https://doi.org/10.14329/isr.2017.19.1.001
- Xu, H., T. Dinev, H. Smith, and P. Hart, "Examining the formation of individual's privacy concerns: Toward an integrative view", International Conference on Information Systems (ICIS) 2008 Proceeding, 2008, Paper 6, Available at https://aisel.aisnet.org/icis2008/6.
- Yun, H., G. Lee, and D. J. Kim, "A chronological review of empirical research on personal information privacy concerns: An analysis of contexts and research constructs", Information & Management, Vol.56, No.4, 2019, pp. 570-601. https://doi.org/10.1016/j.im.2018.10.001