1 |
G. V. Research. (2019). Home Textiles Market Size, Share & Trends Analysis Report by Product (Carpets & Floor Covering, Bathroom Linen, Bedroom Linen), By Region, By Distribution Channel (Retail Outlet, Online), And Segment Forecasts, 2019 - 2025. https://www.globenewswire.com
|
2 |
R. W. Lee, I. H. Hwang & S. H. Hu. (2017). Exploratory research of information security strategy focused on human factors. The Journal of General Education, 6, 103-124.
DOI
|
3 |
J. D'Arcy & P.-L. Teh. (2019). Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization. Information & Management, 56(7), 103151. DOI : 10.1016/j.im.2019.02.006
DOI
|
4 |
Verizon. (2020). 2020 data breach investigations report. Richmod, Texas.
|
5 |
I. Corradini, (2020). Security: Human Nature and Behaviour. Springer.
|
6 |
M. L. Foulds. (1971). Changes in locus of internal-external control: A growth group experience. Comparative Group Studies, 2(3), 293-300. DOI : 10.1177/104649647100200303
DOI
|
7 |
S. A. Stumpf & M. London. (1981). Management promotions: Individual and organizational factors influencing the decision process. Academy of Management Review, 6(4), 539-549.
DOI
|
8 |
S. H. Schwartz. (1990). Individualism-collectivism: Critique and proposed refinements. Journal of cross-cultural psychology, 21(2), 139-157.
DOI
|
9 |
L. Tredinnick. (2008). Digital information culture: the individual and society in the digital age. Amsterdam : Elsevier.
|
10 |
M. J. Gelfand, L. H. Nishii & J. L. Raver. (2006). On the nature and importance of cultural tightness-looseness. Journal of Applied Psychology, 91(6), 1225-1244. DOI : 10.1037/0021-9010.91.6.1225
DOI
|
11 |
M. Siponen, M. A. Mahmood & S. Pahnila. (2014). Employees' adherence to information security policies: An exploratory field study. Information & Management, 51(2), 217-224.
DOI
|
12 |
E. Hartono, C. W. Holsapple, K.-Y. Kim, K.-S. Na & J. T. Simpson. (2014). Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems, 62, 11-21.
DOI
|
13 |
T. Herath & H. R. Rao. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125.
DOI
|
14 |
P. Ifinedo. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. DOI : 10.1016/j.cose.2011.10.007
DOI
|
15 |
P. Ifinedo. (2014). Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition. Information & Management, 51(1), 69-79. DOI : 10.1016/j.im.2013.10.001
DOI
|
16 |
N. S. Safa, M. Sookhak, R. Von Solms, S. Furnell, N. A. Ghani & T. Herawan. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78. DOI : 10.1016/j.cose.2015.05.012
DOI
|
17 |
J. Kaur & N. Mustafa, (2013). Examining the effects of knowledge, attitude and behaviour on information security awareness: A case on SME. IEEE.
|
18 |
I. H. Hwang & S. H. Hu. (2018). A Study on the Influence of Information Security Compliance Intention of Employee: Theory of Planned Behavior, Justice Theory, and Motivation Theory Applied. Journal of Digital Convergence, 16(3), 225-236. DOI : 10.14400/JDC.2018.16.3.225
DOI
|
19 |
S. J. Lee & H. Lina Kim. (2018). Roles of perceived behavioral control and self-efficacy to volunteer tourists' intended participation via theory of planned behavior. International Journal of Tourism Research, 20(2), 182-190. DOI : 10.1002/jtr.2171
DOI
|
20 |
B. Khan, K. S. Alghathbar, S. I. Nabi & M. K. Khan. (2011). Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management, 5(26), 10862-10868. DOI : 10.5897/AJBM11.067
|
21 |
M. Chan, I. Woon & A. Kankanhalli. (2005). Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of information privacy and security, 1(3), 18-41.
DOI
|
22 |
I. H. Hwang & S. H. Hu. (2021). A Study on the Information Security Related Organizational Citizenship Behavior : From Prospect Theory and Goal Orientation Theory Perspective. Journal of Digital Convergence, 19(1), 89-97.
DOI
|