1 |
Turban, Efraim, et al. Electronic Commerce 2018: A Managerial and Social Networks Perspective. Springer, 2017.
|
2 |
Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson Education India, 2016.
|
3 |
정병호․김병초, "중소기업의 IT 투자에 따른 정보 품질과 프로세스 개선에 관한 연구," 중소기업연구, 제36권, 제4호, 2014, pp.47-71.
|
4 |
최재영, "IT 투자 정당화 요인에 관한 연구," 디지털정보산업학회지, 제11권, 제4호, 2015, pp.177-187.
|
5 |
Hartman, Laura Pincus, Joseph R. DesJardins, and Chris MacDonald. Business ethics: Decision making for personal integrity and social responsibility. New York: McGraw-Hill, 2014.
|
6 |
NIST, Information Security Handbook: A Guide for Managers, 2006.
|
7 |
Conger, Sue, Karen D. Loch, and B. Loerine Helft. "Ethics and information technology use: a factor analysis of attitudes to computer use," Information Systems Journal, Vol.5, No.3, 1995, pp. 161-183.
DOI
|
8 |
Ferrell, Odies C., and John Fraedrich. Business ethics: Ethical decision making & cases. Nelson Education, 2015.
|
9 |
Heller, Frank., "Socio-technology and the environment," Human Relations, Vol.50, No.5, pp. 605-624, 1997.
DOI
|
10 |
Elster, Jon. Rational choice history: A case of excessive ambition. 2000.
|
11 |
Elster, Jon, ed. Rational choice. NYU Press, 1986.
|
12 |
Elster, Jon. "The nature and scope of rational-choice explanation," Science in reflection. Springer, Vol. 110, 1988, pp.51-65.
|
13 |
Tenbrunsel, Ann E. "Misrepresentation and expectations of misrepresentation in an ethical dilemma: The role of incentives and temptation." Academy of Management Journal, Vol.41, No.3, 1998, pp.330-339.
DOI
|
14 |
De Dreu, Carsten KW, Bernard A. Nijstad, and Daan van Knippenberg. "Motivated information processing in group judgment and decision making," Personality and social psychology review, Vol.12, No.1, 2008, pp.22-49.
DOI
|
15 |
Anderson, Evan E., and Joobin Choobineh., "Enterprise information security strategies," Computers & Security, Vol.27, No.1, 2008, pp. 22-29.
DOI
|
16 |
정병호, "기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구," 디지털정보산업학회지, 제12권, 제2호, 2016, pp.73-86.
|
17 |
이정환․정병호․김병초, "기업 보안 유형에 따른 보안사고 대응역량: 사회기술시스템 이론 관점에서," 한국IT서비스학회지, 제12권, 제1호, 2013, pp.289-208.
DOI
|
18 |
정병호․김병초, "윤리 프로그램을 통한 비윤리적 정보공유 행동의 개선 : 사회적 자본과 잔물결 효과," 한국디지털정책학회, 제15권, 제8호, 2017, pp.169-182.
|
19 |
Schlegelmilch, Bodo B., and Irene Pollach., "The perils and opportunities of communicating corporate ethics," Journal of Marketing Management, Vol.21, No.3-4, 2005, pp.267-290.
DOI
|
20 |
Burt, R. S. "The network structure of social capital., Research in organizational behavior," Vol. 22, 2000, pp. 345-423.
DOI
|
21 |
Clegg, Chris W., "Sociotechnical principles for system design," Applied ergonomics, Vol. 31, No. 5, 2000, pp.463-477.
DOI
|
22 |
Seibert, Scott E., Maria L. Kraimer, and Robert C. Liden., "A social capital theory of career success," Academy of management journal, Vol.44, No.2, 2001, pp. 219-237.
DOI
|
23 |
Ifinedo, Princely., "Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition," Information & Management, Vol. 51, No. 1, 2014, pp. 69-79.
DOI
|
24 |
Merkow, Mark S., and Jim Breithaupt. Information security: Principles and practices, Pearson Education, 2014.
|
25 |
정병호․김병초, "IT 프로젝트 모방 투자 유형에 따른 성과 차이 연구," 한국IT서비스학회지, 제11권, 제3호, 2012, pp.205-225.
DOI
|
26 |
Guo, Ken H., "Security-related behavior in using information systems in the workplace: A review and synthesis," Computers & Security, Vol. 32, 2013, pp. 242-251.
DOI
|
27 |
신현조․이경복․박태형, "인적 및 직무특성과 보안 교육 이수율 및 사이버테러 대응과의 연관성 분석," 디지털산업정보학회지, 제10권, 제4호, 2014, pp. 97-107.
|
28 |
Carroll, John M., Confidential information sources: Public and private, Elsevier, 2014.
|
29 |
Hair, Joseph F., Multivariate data analysis, 2010.
|